학술논문
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy
Document Type
Periodical
Source
IEEE Transactions on Computers IEEE Trans. Comput. Computers, IEEE Transactions on. 73(2):340-352 Feb, 2024
Subject
Language
ISSN
0018-9340
1557-9956
2326-3814
1557-9956
2326-3814
Abstract
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two decades, plenty of works seek to outsource various specific tasks to servers while ensuring the security of private data. The tasks to be outsourced are countless; however, the computations involved are similar. In this article, we construct a series of novel protocols that support the secure computation of various functions on numbers (e.g., the basic elementary functions) and matrices (e.g., the calculation of eigenvectors and eigenvalues) on arbitrary $n\geq 2$n≥2 servers. All protocols only require constant rounds of interactions and achieve low computation complexity. Moreover, the proposed $n$n-party protocols ensure the security of private data even though $n-1$n-1 servers collude. The convolutional neural network models are utilized as the case studies to verify the protocols. The theoretical analysis and experimental results demonstrate the correctness, efficiency, and security of the proposed protocols.