2016
DOI: 10.1007/978-3-319-28910-6_21
|View full text |Cite
|
Sign up to set email alerts
|

Fast Secure Scalar Product Protocol with (almost) Optimal Efficiency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…In fact, it has been proved that it is not possible to have secure two-party computation without relying on intractable problems or relaxed computation models [4]. In light of this general fact, we can conclude that the attempts of [36], [37], [38] and [39] have been condemned to failure from the beginning. Therefore, we do not discuss such solutions further.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, it has been proved that it is not possible to have secure two-party computation without relying on intractable problems or relaxed computation models [4]. In light of this general fact, we can conclude that the attempts of [36], [37], [38] and [39] have been condemned to failure from the beginning. Therefore, we do not discuss such solutions further.…”
Section: B Related Workmentioning
confidence: 99%
“…There are several attempts at secure realization of scalar product functionalities in the literature. In [36], [37], [38] and [39], the two-party SSP functionality is considered and solutions without relying on a third party or intractable problems are targeted. Unfortunately, all of these solutions trade off security for efficiency.…”
Section: B Related Workmentioning
confidence: 99%
“…Nevertheless, the schemes either are not provably secure or have heavy computation and communication overheads. Recently, Zhu et al propose two efficient solutions for secure scalar product protocol [45,46], which can be utilized to securely compute the Hamming distance of two private strings but cannot support the distance comparison. Cheng et al [47] review the approaches to secure Internet of Things in a quantum world.…”
Section: Related Workmentioning
confidence: 99%
“…Their protocol was based on Homomorphic encryption to protect privacy under semi-honest model of adversaries. Zhu et al [29] proposed a secure two-party scalar product protocol. Authors affirmed having no extra communication overheads compared to the scalar product computation without privacy-protection.…”
Section: Privacy-preserving Cosine Similaritymentioning
confidence: 99%
“…To summarize, we can classify existing privacy-preserving similarity evaluation works into two categories: a) methods that are based on cryptographic schemes [25,30,31,32,26,27,28,29], such as Homomorphic encryption. These methods are trading security and performance.…”
Section: Privacy-preserving Cosine Similaritymentioning
confidence: 99%