Skip to main content
placeholder image

Optimally Efficient Secure Scalar Product with Applications in Cloud Computing

Journal Article


Abstract


  • Secure computation of scalar product is of considerable importance due to its central role in many practical computation scenarios with privacy and security requirements. This paper includes new results about the secure two-party scalar product. Specifically, a perfectly secure and universally composable two-party split scalar product (SSP) protocol is proposed in the preprocessing model. In addition to full security, the proposed SSP protocol enjoys the advantage of optimal efficiency. To show the optimality of this SSP protocol, information theoretic lower bounds on the amount of communicated data in a secure two-party computation in the preprocessing model are derived. These bounds are not limited to SSP functionality but apply to a large class of two-party functionalities. A part of this paper is devoted to applications of the proposed SSP protocol in secure cloud computing. Specifically, based on this protocol, a cloud-assisted privacy-preserving profile-matching scheme and a secure remote health monitoring scheme are proposed. Both of the solutions are highly efficient and significantly improve the previous work.

Authors


  •   Siabi, Babak (external author)
  •   Berenjkoub, Mehdi (external author)
  •   Susilo, Willy

Publication Date


  • 2019

Citation


  • Siabi, B., Berenjkoub, M. & Susilo, W. (2019). Optimally Efficient Secure Scalar Product with Applications in Cloud Computing. IEEE Access, 7 42798-42815.

Scopus Eid


  • 2-s2.0-85064866955

Number Of Pages


  • 17

Start Page


  • 42798

End Page


  • 42815

Volume


  • 7

Place Of Publication


  • United States

Abstract


  • Secure computation of scalar product is of considerable importance due to its central role in many practical computation scenarios with privacy and security requirements. This paper includes new results about the secure two-party scalar product. Specifically, a perfectly secure and universally composable two-party split scalar product (SSP) protocol is proposed in the preprocessing model. In addition to full security, the proposed SSP protocol enjoys the advantage of optimal efficiency. To show the optimality of this SSP protocol, information theoretic lower bounds on the amount of communicated data in a secure two-party computation in the preprocessing model are derived. These bounds are not limited to SSP functionality but apply to a large class of two-party functionalities. A part of this paper is devoted to applications of the proposed SSP protocol in secure cloud computing. Specifically, based on this protocol, a cloud-assisted privacy-preserving profile-matching scheme and a secure remote health monitoring scheme are proposed. Both of the solutions are highly efficient and significantly improve the previous work.

Authors


  •   Siabi, Babak (external author)
  •   Berenjkoub, Mehdi (external author)
  •   Susilo, Willy

Publication Date


  • 2019

Citation


  • Siabi, B., Berenjkoub, M. & Susilo, W. (2019). Optimally Efficient Secure Scalar Product with Applications in Cloud Computing. IEEE Access, 7 42798-42815.

Scopus Eid


  • 2-s2.0-85064866955

Number Of Pages


  • 17

Start Page


  • 42798

End Page


  • 42815

Volume


  • 7

Place Of Publication


  • United States