The confidential computation protocol of matrix QR decomposition with two parties
We analyze the design method of the reference [8] who construct a the confidential computation protocol of matrix triangular decomposition with two parties, and find that it can not realized the confidential computation protocol of matrix QR decomposition with two parties. Using a new decomposition...
Saved in:
Published in | Energy procedia Vol. 13; pp. 3065 - 3071 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
2011
|
Subjects | |
Online Access | Get full text |
ISSN | 1876-6102 |
DOI | 10.1016/j.egypro.2011.11.444 |
Cover
Abstract | We analyze the design method of the reference [8] who construct a the confidential computation protocol of matrix triangular decomposition with two parties, and find that it can not realized the confidential computation protocol of matrix QR decomposition with two parties. Using a new decomposition structure, the data perturbation assumption and oblivious transfer protocol, we skillfully constructed a confidential computation protocol of matrix QR decomposition with two parties, and proved it's the correctness and confidentiality. The efficiency of this protocol is as high as the literature [8] because we don’t using the time-consuming modular exponentiation computation. |
---|---|
AbstractList | We analyze the design method of the reference [8] who construct a the confidential computation protocol of matrix triangular decomposition with two parties, and find that it can not realized the confidential computation protocol of matrix QR decomposition with two parties. Using a new decomposition structure, the data perturbation assumption and oblivious transfer protocol, we skillfully constructed a confidential computation protocol of matrix QR decomposition with two parties, and proved it's the correctness and confidentiality. The efficiency of this protocol is as high as the literature [8] because we don’t using the time-consuming modular exponentiation computation. |
Author | Pan, Feng Yang, Xiao-Yuan Liu, Zhen |
Author_xml | – sequence: 1 givenname: Zhen surname: Liu fullname: Liu, Zhen email: lliuzheng@163.com – sequence: 2 givenname: Feng surname: Pan fullname: Pan, Feng – sequence: 3 givenname: Xiao-Yuan surname: Yang fullname: Yang, Xiao-Yuan |
BookMark | eNotUNtKAzEUzEMF2-of-JAf2DXZZLPriyDFS6Eglfoc0uTEZtkmyyZa_XuzVhg4Z2CYGWaBZj54QOiGkpISKm67Ej5-hjGUFaG0zOCcz9Ccto0oBCXVJVrE2BHSENLyOdruDoB18NYZ8MmpPpPj8JlUcsHj7JOCDj0OFh9VGt033r5hA5MmRPenObl0wOkU8KDG5CBeoQur-gjX_3eJ3p8ed6uXYvP6vF49bArIPXnBRaVUAzXVFpraCGa0JVzomprcuBKWGMUsZEaMsbYWd3vW5lcz1nCx52yJ7s--kEO-HIwyagdeg3Ej6CRNcJISOY0iO3keRU6jyIwcwX4BVVxeFw |
ContentType | Journal Article |
Copyright | 2012 |
Copyright_xml | – notice: 2012 |
DBID | 6I. AAFTH |
DOI | 10.1016/j.egypro.2011.11.444 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Economics Engineering |
EndPage | 3071 |
ExternalDocumentID | S1876610211032607 |
GroupedDBID | --K 0R~ 1B1 1~5 4.4 457 4G. 5VS 6I. 7-5 71M AAEDT AAEDW AAFTH AAFWJ AAIKJ AALRI AAQFI AAXUO AAYWO ABMAC ABWVN ACGFS ACRPL ADBBV ADEZE ADMUD ADNMO ADVLN AEXQZ AFTJW AGHFR AGUBO AITUG AKRWK ALMA_UNASSIGNED_HOLDINGS AMRAJ E3Z EBS EJD EP2 EP3 FDB FEDTE FIRID FNPLU HVGLF HZ~ IXB KQ8 M41 O-L O9- OK1 OKI OZT RIG ROL SES SSZ TR2 XH2 ~S- |
ID | FETCH-LOGICAL-e1014-462aa7e51cfe75d63dcf046c51d44426f0da3fe1d40ddff569b380ddc33746b43 |
IEDL.DBID | IXB |
ISSN | 1876-6102 |
IngestDate | Tue May 20 10:00:22 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | matrix decomposition data perturbation assumption oblivious transfer protocol secure multi-party computation QR decomposition |
Language | English |
License | http://creativecommons.org/licenses/by-nc-nd/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-e1014-462aa7e51cfe75d63dcf046c51d44426f0da3fe1d40ddff569b380ddc33746b43 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S1876610211032607 |
PageCount | 7 |
ParticipantIDs | elsevier_sciencedirect_doi_10_1016_j_egypro_2011_11_444 |
PublicationCentury | 2000 |
PublicationDate | 2011 |
PublicationDateYYYYMMDD | 2011-01-01 |
PublicationDate_xml | – year: 2011 text: 2011 |
PublicationDecade | 2010 |
PublicationTitle | Energy procedia |
PublicationYear | 2011 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Qin Jing, Zhang Zhenfeng, Feng Dengguo, Li (bib0015) 2004; 25 Du, Wenliang (bib0020) 2000 Luo Wen-jun, Li Xiang (bib0025) 2003; 24 Jia Heng-yue, Liu (bib0035) 2008; 44 XiaoYuan Yang, Zhen Liu.The security Matrix factorization agreement with two parties[C]. In:Proceedings of the 2009 International Conference on Computational Intelligence and Security,IEEE Press.USA, 2009. Zhong Xu, Kai Yuan Zhang (bib0045) 2005 Golderich, Micali, Wigderson (bib0010) 1987 Luo Wen-jun, Li Xiang (bib0030) 2005; 28 Yao (bib0005) 1982 |
References_xml | – start-page: 160 year: 1982 end-page: 164 ident: bib0005 article-title: Protocols for secure computations[C] publication-title: In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Los Angeles: – volume: 44 start-page: 112 year: 2008 end-page: 114 ident: bib0035 article-title: Secure two-party computation protocol about Matrix inversion [J] publication-title: Computer Engineering and Applications – volume: 25 start-page: pp.35 year: 2004 end-page: pp.42 ident: bib0015 article-title: A special secure computation agreement with two parties[J] publication-title: Journal on Communications – year: 2005 ident: bib0045 article-title: The concise Guide of Matrix theory (The second version) – start-page: 218 year: 1987 end-page: 229 ident: bib0010 article-title: How to play any mental game[C] publication-title: In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York: – volume: 28 start-page: 1230 year: 2005 end-page: 1235 ident: bib0030 article-title: Multi-party secure matrix multiplication protocol and applications[J] publication-title: Chinese Journal of Computers – year: 2000 ident: bib0020 article-title: A study of several specific secure two-party computation problems [D] – volume: 24 start-page: 31 year: 2003 end-page: 34 ident: bib0025 article-title: Secure two-party confident computation about the eigenvalue of matrix[J] publication-title: Journal of Jishou University – reference: XiaoYuan Yang, Zhen Liu.The security Matrix factorization agreement with two parties[C]. In:Proceedings of the 2009 International Conference on Computational Intelligence and Security,IEEE Press.USA, 2009. |
SSID | ssj0070084 |
Score | 1.8639411 |
Snippet | We analyze the design method of the reference [8] who construct a the confidential computation protocol of matrix triangular decomposition with two parties,... |
SourceID | elsevier |
SourceType | Publisher |
StartPage | 3065 |
SubjectTerms | data perturbation assumption matrix decomposition oblivious transfer protocol QR decomposition secure multi-party computation |
Title | The confidential computation protocol of matrix QR decomposition with two parties |
URI | https://dx.doi.org/10.1016/j.egypro.2011.11.444 |
Volume | 13 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB5KL-pBtCq-2YPXpU13s2mOWizFg1C10FvY7AMqmJQ2RX--M5sE4lXYQx6zYXeGzO4s830D8CBUaoVPFU9zY7mUqeS5UZobabWexOgQ6yzfVzVfypdVvOrBtMXCUFpl4_trnx68dfNk2GhzuFmvh-8R_siKKlMTJ5wKiHJClRKIb_XUeuOECOMp6EJhTtItfC7keFGpr21ZE3lik1J21qTOOjM7geNmg8ge6zGcQs8VAzho8cO7ARx1KATPYIF2ZvjSrwPiFnuaUKchKJwRC0OJpmalZ19Exv_DFm_MOpJpsrUYncSy6rtkG5q3253Dcvb8MZ3zpkwCd1Rol0s11jpxcWS8S2KrhDUeo14TRxYnNFZ-ZLXwDu9G1nofqzQXE7w0QiRS5VJcQL8oC3cJTBiMv0yU4odx2ddjnevIEs7DoOHQbFeQtNrJ_lgpQwectQljn1mt14z0iiFGhsO4_nfPGzisz3Gp3UK_2u7dHW4Eqvw-WPoXp8mzDw |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB5KPVQPolXxbQ5eQ7tNNts9arG0WgvVFnpbsnlABbulrejPd2YfUK9CDvuYLMkMO48w8w3AvVCxFT5WPE6N5VLGkqdGaW6k1bobokIssnzHajCTz_NwXoNeVQtDaZWl7i90eq6tyyetkput1WLReg_wR1bUmZow4RRVlO-hN6AIQH84f6zUcUSI8RR1ITUn8qp-Lk_yol5f66xA8sQhpdwxSjuGpn8Eh6WHyB6KRRxDzS2b0KgKiDdNONjBEDyBCQqa4Uu_yEtucabJGzXkHGcEw5ChrFnm2Seh8f-wyRuzjmjKdC1GR7Fs-52xFW3cbU5h1n-a9ga87JPAHXXa5VJ1tI5cGBjvotAqYY3HsNeEgcUNdZRvWy28w7u2td6HKk5FFy-NEJFUqRRnUF9mS3cOTBgMwEwQ44fR7uuOTnVgqdDDoORQbhcQVdxJ_ogpQQ2cVBljH0nB14T4ijFGgsu4_PfMO2gMpq-jZDQcv1zBfnGoS-Ma6tv1l7tBr2Cb3uZS_wXFWrYz |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+confidential+computation+protocol+of+matrix+QR+decomposition+with+two+parties&rft.jtitle=Energy+procedia&rft.au=Liu%2C+Zhen&rft.au=Pan%2C+Feng&rft.au=Yang%2C+Xiao-Yuan&rft.date=2011&rft.pub=Elsevier+Ltd&rft.issn=1876-6102&rft.volume=13&rft.spage=3065&rft.epage=3071&rft_id=info:doi/10.1016%2Fj.egypro.2011.11.444&rft.externalDocID=S1876610211032607 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1876-6102&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1876-6102&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1876-6102&client=summon |