Verifiable private multi-party computation: Ranging and ranking
@article{Zhang2013VerifiablePM, title={Verifiable private multi-party computation: Ranging and ranking}, author={L. Zhang and X. Li and Y. Liu and T. Jung}, journal={2013 Proceedings IEEE INFOCOM}, year={2013}, pages={605-609} }
The existing work on distributed secure multi-party computation, e.g., set operations, dot product, ranking, focus on the privacy protection aspects, while the verifiability of user inputs and outcomes are neglected. Most of the existing works assume that the involved parties will follow the protocol honestly. In practice, a malicious adversary can easily forge his/her input values to achieve incorrect outcomes or simply lie about the computation results to cheat other parities. In this work… CONTINUE READING
Tables and Topics from this paper
Tables
40 Citations
Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel
- Computer Science
- IEEE Transactions on Dependable and Secure Computing
- 2015
- 79
- PDF
Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks
- Computer Science
- IEEE Access
- 2020
- 1
- PDF
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data
- Computer Science
- 2015 IEEE International Conference on Cloud Engineering
- 2015
- 29
- PDF
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
- Computer Science
- 2013 Proceedings IEEE INFOCOM
- 2013
- 114
- PDF
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
- Computer Science
- Cluster Computing
- 2018
- 56
Privacy-Preserving Verifiable Incentive Mechanism for Crowdsourcing Market Applications
- Computer Science, Mathematics
- 2013
- 4
- PDF
Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks
- Computer Science
- IEEE Transactions on Mobile Computing
- 2015
- 50
- PDF
A General Framework for Privacy-Preserving Distributed Greedy Algorithm
- Computer Science
- ArXiv
- 2013
- 3
- PDF
References
SHOWING 1-10 OF 22 REFERENCES
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Computer Science
- CRYPTO
- 2010
- 946
- PDF
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
- Computer Science
- 2013 Proceedings IEEE INFOCOM
- 2013
- 114
- PDF
Verifiable secret sharing and multiparty protocols with honest majority
- Computer Science
- STOC '89
- 1989
- 955
- PDF
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
- Computer Science, Mathematics
- Journal of Cryptology
- 2008
- 258
- PDF
Efficient Privacy-Preserving k-Nearest Neighbor Search
- Computer Science
- 2008 The 28th International Conference on Distributed Computing Systems
- 2008
- 95
Privacy preserving cloud data access with multi-authorities
- Computer Science
- 2013 Proceedings IEEE INFOCOM
- 2013
- 146
- PDF
FindU: Privacy-preserving personal profile matching in mobile social networks
- Computer Science
- 2011 Proceedings IEEE INFOCOM
- 2011
- 229
- PDF
Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks
- Computer Science
- IEEE INFOCOM 2008 - The 27th Conference on Computer Communications
- 2008
- 152
- PDF