Secure computation protocol of Chebyshev distance under the malicious model
Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed...
Saved in:
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2024-07-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-024-67907-9 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832571667181731840 |
---|---|
author | Xin Liu Weitong Chen Lu Peng Dan Luo Likai Jia Gang Xu Xiubo Chen Xiaomeng Liu |
author_facet | Xin Liu Weitong Chen Lu Peng Dan Luo Likai Jia Gang Xu Xiubo Chen Xiaomeng Liu |
author_sort | Xin Liu |
collection | DOAJ |
description | Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. This paper proposes a secure protocol for computing Chebyshev distance under a semi-honest model, leveraging the additive homomorphic properties of the NTRU cryptosystem and a vector encoding method. This protocol transforms the confidential computation of Chebyshev distance into the inner product of confidential computation vectors, as demonstrated through the model paradigm validating its security under the semi-honest model. Addressing potential malicious participant scenarios, a secure protocol for computing Chebyshev distance under a malicious model is introduced, utilizing cryptographic tools such as digital commitments and mutual decryption methods. The security of this protocol under the malicious model is affirmed using the real/ideal model paradigm. Theoretical analysis and experimental simulations demonstrate the efficiency and practical applicability of the proposed schemes. |
format | Article |
id | doaj-art-85d66a07da2849f89be21b1681444a44 |
institution | Kabale University |
issn | 2045-2322 |
language | English |
publishDate | 2024-07-01 |
publisher | Nature Portfolio |
record_format | Article |
series | Scientific Reports |
spelling | doaj-art-85d66a07da2849f89be21b1681444a442025-02-02T12:25:10ZengNature PortfolioScientific Reports2045-23222024-07-0114111810.1038/s41598-024-67907-9Secure computation protocol of Chebyshev distance under the malicious modelXin Liu0Weitong Chen1Lu Peng2Dan Luo3Likai Jia4Gang Xu5Xiubo Chen6Xiaomeng Liu7School of Digtial and Intelligence Industry, Inner Mongolia University of Science and TechnologySchool of Digtial and Intelligence Industry, Inner Mongolia University of Science and TechnologyBeijing Institute of Computer Technology and ApplicationSchool of Intelligent Computing Engineering, Tianjin Ren’ai CollegeBeijing Institute of Computer Technology and ApplicationCollege of Information, North China University of TechnologyState Key Laboratory of Network and Switching Technology, Beijing University of Posts and TelecommunicationsSchool of Digtial and Intelligence Industry, Inner Mongolia University of Science and TechnologyAbstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. This paper proposes a secure protocol for computing Chebyshev distance under a semi-honest model, leveraging the additive homomorphic properties of the NTRU cryptosystem and a vector encoding method. This protocol transforms the confidential computation of Chebyshev distance into the inner product of confidential computation vectors, as demonstrated through the model paradigm validating its security under the semi-honest model. Addressing potential malicious participant scenarios, a secure protocol for computing Chebyshev distance under a malicious model is introduced, utilizing cryptographic tools such as digital commitments and mutual decryption methods. The security of this protocol under the malicious model is affirmed using the real/ideal model paradigm. Theoretical analysis and experimental simulations demonstrate the efficiency and practical applicability of the proposed schemes.https://doi.org/10.1038/s41598-024-67907-9 |
spellingShingle | Xin Liu Weitong Chen Lu Peng Dan Luo Likai Jia Gang Xu Xiubo Chen Xiaomeng Liu Secure computation protocol of Chebyshev distance under the malicious model Scientific Reports |
title | Secure computation protocol of Chebyshev distance under the malicious model |
title_full | Secure computation protocol of Chebyshev distance under the malicious model |
title_fullStr | Secure computation protocol of Chebyshev distance under the malicious model |
title_full_unstemmed | Secure computation protocol of Chebyshev distance under the malicious model |
title_short | Secure computation protocol of Chebyshev distance under the malicious model |
title_sort | secure computation protocol of chebyshev distance under the malicious model |
url | https://doi.org/10.1038/s41598-024-67907-9 |
work_keys_str_mv | AT xinliu securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel AT weitongchen securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel AT lupeng securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel AT danluo securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel AT likaijia securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel AT gangxu securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel AT xiubochen securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel AT xiaomengliu securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel |