Secure Two-party Computation for Equality of Bilateral Data Based on Pinhole Camera Model
- DOI
- 10.2991/978-94-6463-463-1_2How to use a DOI?
- Keywords
- Secure Multi-party Computation; Data equality test; Semi-honest model; key steam
- Abstract
Secure two-party computation is always the focus in the international cryptographic community, and establishing a secure two-party computation for determining the equality of data is a fundamental and crucial task within this field. There is still substantial room for improvement in terms of efficiency and security, so it is worth exploring further. In this paper, two theorems are proved from camera imaging of straight lines on a flat surface and the equality judgement of data between the two-party is innovatively converted into judging whether the inner products of the vectors owned by the two parties are zeroes. Based on the specific property of these vectors, a security protocol is established to determine whether those inner products are zeroes, which realizes the protocol scheme of judging the data equality of two-party under the semi-honest model and analyses its security theoretically. The scheme needs key stream for dynamic data encoding, since only basic arithmetic operations (integer addition, subtraction and multiplication) and a final modulus operation are required after encode without high-order and decimal operations, and the communication complexity is O(1), which greatly improves the efficiency. This scheme may not fit for malicious model, we could use the existing agreements of malicious model to determine whether those inner products are zeroes, by the conversion in this paper we also could complete the equality judgement.
- Copyright
- © 2024 The Author(s)
- Open Access
- Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
Cite this article
TY - CONF AU - Changfeng Gui AU - Mengsi Han AU - Wei He AU - Zhantong Xie PY - 2024 DA - 2024/08/02 TI - Secure Two-party Computation for Equality of Bilateral Data Based on Pinhole Camera Model BT - Proceedings of the International Academic Summer Conference on Number Theory and Information Security (NTIS 2023) PB - Atlantis Press SP - 4 EP - 21 SN - 2352-541X UR - https://doi.org/10.2991/978-94-6463-463-1_2 DO - 10.2991/978-94-6463-463-1_2 ID - Gui2024 ER -