Secure computation protocol of Chebyshev distance under the malicious model

Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed...

Full description

Saved in:
Bibliographic Details
Main Authors: Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu
Format: Article
Language:English
Published: Nature Portfolio 2024-07-01
Series:Scientific Reports
Online Access:https://doi.org/10.1038/s41598-024-67907-9
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832571667181731840
author Xin Liu
Weitong Chen
Lu Peng
Dan Luo
Likai Jia
Gang Xu
Xiubo Chen
Xiaomeng Liu
author_facet Xin Liu
Weitong Chen
Lu Peng
Dan Luo
Likai Jia
Gang Xu
Xiubo Chen
Xiaomeng Liu
author_sort Xin Liu
collection DOAJ
description Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. This paper proposes a secure protocol for computing Chebyshev distance under a semi-honest model, leveraging the additive homomorphic properties of the NTRU cryptosystem and a vector encoding method. This protocol transforms the confidential computation of Chebyshev distance into the inner product of confidential computation vectors, as demonstrated through the model paradigm validating its security under the semi-honest model. Addressing potential malicious participant scenarios, a secure protocol for computing Chebyshev distance under a malicious model is introduced, utilizing cryptographic tools such as digital commitments and mutual decryption methods. The security of this protocol under the malicious model is affirmed using the real/ideal model paradigm. Theoretical analysis and experimental simulations demonstrate the efficiency and practical applicability of the proposed schemes.
format Article
id doaj-art-85d66a07da2849f89be21b1681444a44
institution Kabale University
issn 2045-2322
language English
publishDate 2024-07-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj-art-85d66a07da2849f89be21b1681444a442025-02-02T12:25:10ZengNature PortfolioScientific Reports2045-23222024-07-0114111810.1038/s41598-024-67907-9Secure computation protocol of Chebyshev distance under the malicious modelXin Liu0Weitong Chen1Lu Peng2Dan Luo3Likai Jia4Gang Xu5Xiubo Chen6Xiaomeng Liu7School of Digtial and Intelligence Industry, Inner Mongolia University of Science and TechnologySchool of Digtial and Intelligence Industry, Inner Mongolia University of Science and TechnologyBeijing Institute of Computer Technology and ApplicationSchool of Intelligent Computing Engineering, Tianjin Ren’ai CollegeBeijing Institute of Computer Technology and ApplicationCollege of Information, North China University of TechnologyState Key Laboratory of Network and Switching Technology, Beijing University of Posts and TelecommunicationsSchool of Digtial and Intelligence Industry, Inner Mongolia University of Science and TechnologyAbstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. This paper proposes a secure protocol for computing Chebyshev distance under a semi-honest model, leveraging the additive homomorphic properties of the NTRU cryptosystem and a vector encoding method. This protocol transforms the confidential computation of Chebyshev distance into the inner product of confidential computation vectors, as demonstrated through the model paradigm validating its security under the semi-honest model. Addressing potential malicious participant scenarios, a secure protocol for computing Chebyshev distance under a malicious model is introduced, utilizing cryptographic tools such as digital commitments and mutual decryption methods. The security of this protocol under the malicious model is affirmed using the real/ideal model paradigm. Theoretical analysis and experimental simulations demonstrate the efficiency and practical applicability of the proposed schemes.https://doi.org/10.1038/s41598-024-67907-9
spellingShingle Xin Liu
Weitong Chen
Lu Peng
Dan Luo
Likai Jia
Gang Xu
Xiubo Chen
Xiaomeng Liu
Secure computation protocol of Chebyshev distance under the malicious model
Scientific Reports
title Secure computation protocol of Chebyshev distance under the malicious model
title_full Secure computation protocol of Chebyshev distance under the malicious model
title_fullStr Secure computation protocol of Chebyshev distance under the malicious model
title_full_unstemmed Secure computation protocol of Chebyshev distance under the malicious model
title_short Secure computation protocol of Chebyshev distance under the malicious model
title_sort secure computation protocol of chebyshev distance under the malicious model
url https://doi.org/10.1038/s41598-024-67907-9
work_keys_str_mv AT xinliu securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel
AT weitongchen securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel
AT lupeng securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel
AT danluo securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel
AT likaijia securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel
AT gangxu securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel
AT xiubochen securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel
AT xiaomengliu securecomputationprotocolofchebyshevdistanceunderthemaliciousmodel