Secrecy of two-party secure computation

  • Authors:
  • Yi-Ting Chiang;Da-Wei Wang;Churn-Jung Liau;Tsan-sheng Hsu

  • Affiliations:
  • Institute of Information Science Academia Sinica, Taipei, Taiwan;Institute of Information Science Academia Sinica, Taipei, Taiwan;Institute of Information Science Academia Sinica, Taipei, Taiwan;Institute of Information Science Academia Sinica, Taipei, Taiwan

  • Venue:
  • DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Privacy protection has become one of the most important issues in the information era. Thus, many protocols have been developed to achieve the goal of cooperatively accomplishing a computational task without revealing the participants' private data. Practical protocols, however, do not guarantee perfect privacy protection, as some degree of privacy leakage is allowed during the computation process for the sake of efficient resource consumption, e.g., the number of random bits required and the computation time. Although there are metrics for measuring the amount of resource consumption, as far as we know, there are no effective metrics that measure the degree of privacy leakage. Without such metrics, however, it is difficult to compare protocols fairly. In this paper, we propose a framework based on linear algebra and information theory to measure the amount of privacy leakage in protocols. This framework can be used to analyze protocols that satisfy certain algebraic properties. We use it to analyze three two-party scalar product protocols. The framework might also be extendable to the analysis of other protocols.