학술논문

STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy
Document Type
Periodical
Source
IEEE Transactions on Computers IEEE Trans. Comput. Computers, IEEE Transactions on. 73(2):340-352 Feb, 2024
Subject
Computing and Processing
Protocols
Cryptography
Servers
Task analysis
Additives
Computational modeling
Cloud computing
Secure computation protocol
privacy-preserving computation
share-transform-reveal
additive secret sharing
Language
ISSN
0018-9340
1557-9956
2326-3814
Abstract
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two decades, plenty of works seek to outsource various specific tasks to servers while ensuring the security of private data. The tasks to be outsourced are countless; however, the computations involved are similar. In this article, we construct a series of novel protocols that support the secure computation of various functions on numbers (e.g., the basic elementary functions) and matrices (e.g., the calculation of eigenvectors and eigenvalues) on arbitrary $n\geq 2$n≥2 servers. All protocols only require constant rounds of interactions and achieve low computation complexity. Moreover, the proposed $n$n-party protocols ensure the security of private data even though $n-1$n-1 servers collude. The convolutional neural network models are utilized as the case studies to verify the protocols. The theoretical analysis and experimental results demonstrate the correctness, efficiency, and security of the proposed protocols.