Private Multi-party Matrix Multiplication and Trust Computations

Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys

2016

Abstract

This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players. We first improve on a weighted average protocol, in order to securely compute a dot-product with a quadratic volume of communications and linear number of rounds. We also propose a protocol with five communication rounds, using a Paillier-like underlying homomorphic public key cryptosystem, which is secure in the semi-honest model or secure with high probability in the malicious adversary model. Using ProVerif, a cryptographic protocol verification tool, we are able to check the security of the protocol and provide a countermeasure for each attack found by the tool. We also give a randomization method to avoid collusion attacks. As an application, we show that this protocol enables a distributed and secure evaluation of trust relationships in a network, for a large class of trust evaluation schemes.

Download


Paper Citation


in Harvard Style

Dumas J., Lafourcade P., Orfila J. and Puys M. (2016). Private Multi-party Matrix Multiplication and Trust Computations . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016) ISBN 978-989-758-196-0, pages 61-72. DOI: 10.5220/0005957200610072

in Bibtex Style

@conference{secrypt16,
author={Jean-Guillaume Dumas and Pascal Lafourcade and Jean-Baptiste Orfila and Maxime Puys},
title={Private Multi-party Matrix Multiplication and Trust Computations},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)},
year={2016},
pages={61-72},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005957200610072},
isbn={978-989-758-196-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 4: SECRYPT, (ICETE 2016)
TI - Private Multi-party Matrix Multiplication and Trust Computations
SN - 978-989-758-196-0
AU - Dumas J.
AU - Lafourcade P.
AU - Orfila J.
AU - Puys M.
PY - 2016
SP - 61
EP - 72
DO - 10.5220/0005957200610072