Redirigiendo al acceso original de articulo en 16 segundos...
Inicio  /  Applied Sciences  /  Vol: 12 Par: 6 (2022)  /  Artículo
ARTÍCULO
TITULO

LPCP: An efficient Privacy-Preserving Protocol for Polynomial Calculation Based on CRT

Jiajian Tang    
Zhenfu Cao    
Jiachen Shen and Xiaolei Dong    

Resumen

With the development of privacy-preserving techniques, the increasing demand for secure multiparty computation (MPC) of mobile devices has become a significant challenge. Unfortunately, it is inapplicable for mobile devices to implement the existing secure multiparty computation schemes that rely on costly computation and communication overhead. To solve this problem, we propose an efficient two-party computation protocol secure against semi-honest adversary based on the Chinese remainder theorem (CRT). Our protocol utilizes CRT-based encryption and re-encryption techniques to realize additional and multiplicative homomorphic encryption, which can be transformed into a two-party secure computation scheme. Then, we extend our two-party LPCP protocol into a multiparty LPCP protocol, which is much faster and more space saving than the previous works. For practical purpose, we describe a distance measurement application for mobile devices based on LPCP. In the end, we implement LPCP codes and compare the experimental results to the state-of-the-art two-party and multiparty computation protocols. The experimental result shows that the high computation and communication efficiency of LPCP makes it possible for low computing-power mobile devices to implement multiparty secure computation protocols in reality.

 Artículos similares

       
 
Guangcan Yang, Shoushan Luo, Yang Xin, Hongliang Zhu, Jingkai Wang, Mingzhen Li and Yunfeng Wang    
With the advent of intelligent handheld devices, location sharing becomes one of the most popular services in mobile online social networks (mOSNs). In location-sharing services, users can enjoy a better social experience by updating their real-time loca... ver más
Revista: Applied Sciences

 
Elias Dritsas, Andreas Kanavos, Maria Trigka, Gerasimos Vonitsanos, Spyros Sioutas and Athanasios Tsakalidis    
Privacy Preserving and Anonymity have gained significant concern from the big data perspective. We have the view that the forthcoming frameworks and theories will establish several solutions for privacy protection. The k-anonymity is considered a key sol... ver más
Revista: Algorithms

 
Elias Dritsas, Andreas Kanavos, Maria Trigka, Spyros Sioutas and Athanasios Tsakalidis    
The need to store massive volumes of spatio-temporal data has become a difficult task as GPS capabilities and wireless communication technologies have become prevalent to modern mobile devices. As a result, massive trajectory data are produced, incurring... ver más
Revista: Algorithms

 
Yongwen Du, Gang Cai, Xuejun Zhang, Ting Liu and Jinghua Jiang    
With the rapid development of GPS-equipped smart mobile devices and mobile computing, location-based services (LBS) are increasing in popularity in the Internet of Things (IoT). Although LBS provide enormous benefits to users, they inevitably introduce s... ver más
Revista: Information

 
Adeel Anjum and Guillaume Raschia    
-
Revista: Computers