Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (3): 97-110.doi: 10.11959/j.issn.2096-109x.2022038

• Papers • Previous Articles     Next Articles

Private-preserving scientific computation of the rational numbers

Xuhong LIU, Chen SUN   

  1. School of Economics and Management, Shanghai University of Sport, Shanghai 200438, China
  • Revised:2022-03-19 Online:2022-06-15 Published:2022-06-01

Abstract:

As a fundamental part of cryptography, secure multiparty computation (SMC) is a building block of various cryptographic protocols, and it is also a hot topic in the international cryptographic community.In recent years, many SMC problems, such as secret information comparison, secret set problems and secure multiparty computational geometry, have been widely studied.As many practical problems need to be described by rational numbers, it is both theoretically and practically important to study the SMC problems in the rational number field.However, most of the existing researches focus on integers and the studied data are mainly one-dimensional data.There are few researches on secure multiparty computation of multi-dimensional data in the rational number field, but they can’t be generalized.Based on the fractional representation of rational numbers, the new encoding schemes about rational numbers and rational number vectors were proposed, which could encode multi-dimensional data in the rational number field and provided new solutions for other SMC problems in the rational number field.Based on the encoding scheme and one-way hash function, some protocols were designed for equality problems and set problems in the rational number field.These protocols used basic arithmetic operation and hash operation to guarantee efficiency than existing related protocols.And these protocols didn’t limit the range of research data and they were more widely applicable.It proves that these protocols are secure in the semi-honest model using simulation paradigm, and demonstrates the efficiency and the applicability of these protocols by theoretical analysis and experiment.A practical example was also given to illustrate that approaches are more versatile, and they could also be directly used to solve some secure multiparty computational geometry problems in the rational number field.

Key words: secure multiparty computation, encoding scheme, one-way hash function, rational numbers, simulation paradigm

CLC Number: 

No Suggested Reading articles found!