Your browser doesn't support javascript.
loading
Secure computation protocol of Chebyshev distance under the malicious model.
Liu, Xin; Chen, Weitong; Peng, Lu; Luo, Dan; Jia, Likai; Xu, Gang; Chen, Xiubo; Liu, Xiaomeng.
Affiliation
  • Liu X; School of Digtial and Intelligence Industry, Inner Mongolia University of Science and Technology, Baotou, 014010, China.
  • Chen W; School of Intelligent Computing Engineering, Tianjin Ren'ai College, Tianjin, 301636, China.
  • Peng L; School of Digtial and Intelligence Industry, Inner Mongolia University of Science and Technology, Baotou, 014010, China.
  • Luo D; Beijing Institute of Computer Technology and Application, Beijing, 100039, China.
  • Jia L; School of Intelligent Computing Engineering, Tianjin Ren'ai College, Tianjin, 301636, China. renailuodan@163.com.
  • Xu G; Beijing Institute of Computer Technology and Application, Beijing, 100039, China.
  • Chen X; College of Information, North China University of Technology, Beijing, 100144, China.
  • Liu X; State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China.
Sci Rep ; 14(1): 17115, 2024 Jul 24.
Article in En | MEDLINE | ID: mdl-39048647
ABSTRACT
Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed for similarity measurement, classification, and clustering of sensitive archival information, thereby enhancing the security of sensitive archival queries and sharing. This paper proposes a secure protocol for computing Chebyshev distance under a semi-honest model, leveraging the additive homomorphic properties of the NTRU cryptosystem and a vector encoding method. This protocol transforms the confidential computation of Chebyshev distance into the inner product of confidential computation vectors, as demonstrated through the model paradigm validating its security under the semi-honest model. Addressing potential malicious participant scenarios, a secure protocol for computing Chebyshev distance under a malicious model is introduced, utilizing cryptographic tools such as digital commitments and mutual decryption methods. The security of this protocol under the malicious model is affirmed using the real/ideal model paradigm. Theoretical analysis and experimental simulations demonstrate the efficiency and practical applicability of the proposed schemes.

Full text: 1 Collection: 01-internacional Database: MEDLINE Language: En Journal: Sci Rep Year: 2024 Document type: Article Affiliation country: China Country of publication: United kingdom

Full text: 1 Collection: 01-internacional Database: MEDLINE Language: En Journal: Sci Rep Year: 2024 Document type: Article Affiliation country: China Country of publication: United kingdom