Figures
Abstract
The determination of the relation between a number and a numerical interval is one of the core problems in the scientific calculation of privacy protection. The calculation of the relationship between two numbers and a numerical interval to protect privacy is also the basic problem of collaborative computing. It is widely used in data queries, location search and other fields. At present, most of the solutions are still fundamentally limited to the integer level, and there are few solutions at the real number level. To solve these problems, this paper first uses Bernoulli inequality generalization and a monotonic function property to extend the solution to the real number level and designs two new protocols based on the homomorphic encryption scheme, which can not only protect the data privacy of both parties involved in the calculation, but also extend the number domain to real numbers. In addition, this paper designs a solution to the confidential cooperative determination problem between real numbers by using the sign function and homomorphism multiplication. Theoretical analysis shows that the proposed solution is safe and efficient. Finally, some extension applications based on this protocol are given.
Citation: Lu S, Lu Y, Sun Y (2021) Collaborative calculation and application of interreal and real interval relations to protect privacy. PLoS ONE 16(12): e0261213. https://doi.org/10.1371/journal.pone.0261213
Editor: Hua Wang, Victoria University, AUSTRALIA
Received: August 18, 2021; Accepted: November 27, 2021; Published: December 14, 2021
Copyright: © 2021 Lu et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Data Availability: All relevant data are within the paper.
Funding: Yuefeng Lu was funded by the grant from State Key Laboratory of Resources and Environmental Information System of China and the Strategic Priority Research Program of Chinese Academy of Sciences (Grant No. XDA 20030302). The funder play a role in the decision to publish and preparation of the manuscript.
Competing interests: The authors have declared that no competing interests exist.
Introduction
With the rapid development of Internet technology, especially the rapid rise of big data computing, blockchains, artificial intelligence and other technologies, collaborative computing occupies an increasingly important position in humans’ daily work and learning. However, while the users are assisting in completing some computations, the need for the privacy and security of the data information of each cooperative participant is particularly urgent. Secure Multiparty Computation (SMC) was first proposed by A.C. Yao in 1982 in [1]. In [2], the theory of SMC has been further developed and laid its theoretical foundation. Secure multiparty computation mainly solves the problem that in a multiuser network in which users do not trust each other, each user can cooperate to perform a reliable computing task without disclosing their own private input information [3]. Therefore, secure multiparty computation has become a research hotspot in the field of cryptography in recent years [4] and is a core technology that can solve the collaborative computing problem to protect data information privacy.
In fact, it is impractical to use general protocols to solve some special instances in secure multiparty computation. In order to achieve high efficiency, some special methods are needed for some special problems [5]. In recent years, secure multiparty computation technology has been introduced by many scholars to the traditional fields of scientific computing, data mining, computational geometry, information retrieval and statistical analysis. Thus, new research directions, such as the correlation of protecting private information [6], privacy preserving cooperative scientific computations [7–9], Privacy Preserving Data Mining (PPDM) [10, 11], Privacy Preserving Computation Geometry (PPCG for short) [12–15], Private Information Retrieval (PIR) [16], Privacy Preserving Statistical Analysis (PPSA) [17], and the question of preserving the data ranking of private information [18–20], and secure multiparty quantum computation [21, 22] are generated, thus solving some important security application problems.
The relationship between and between numerical values is the core of the scientific computational problem of privacy protection. In reference [23], with the help of the theory of computational geometry, the input rational number or interval endpoint is taken as the straight line slope passing through the origin in the coordinate system, the problem of interval confidential calculation is transformed into the problem of a positional relation judgment between straight lines, and a solution providing a rational number and a rational interval confidential calculation is proposed. In reference [8], the positional relationship between rational numbers and rational intervals is transformed into other problems with the help of polynomials. It converts the problem into an integer vector to solve the issues of previous studies, which are confined to the rational number level and are still converted to an integer to solve. There are some limitations. The research purpose of this paper is to use the new technique to solve the decision problem of the relationship between the real and the real number interval and expand the real number level while improving the efficiency of the protocol. Furthermore, a new solution to the confidential cooperative determination problem between real numbers is designed by using the sign function and homomorphism multiplication.
Contributions of this paper
First, by combining Bernoulli inequality generalization with a monotonic function, the scope of the data size comparison with privacy protection is extended to real numbers. In addition, before collaborative comparison calculation, by means of the Bernoulli inequality extension technique, the numerical range of real numbers to be compared is reduced to the interval level, and the addition and decryption operations are reduced. Based on the ElGamal encryption system and Paillier encryption system, this paper constructs a real number size comparison protocol.
Second, using symbolic functions and homomorphic encryption systems, an efficient cooperative decision protocol for confidentiality between real numbers is designed with certain techniques. Finally, the protocol is designed and applied to solve the problem of confidential data queries and the problem of confidential cooperative relationships between real numbers.
Structure of this paper
Section 2 of this paper introduces the preparatory knowledge. In section 3, the designed protocol solves the problem of the collaborative calculation of the size comparison between real numbers to protect privacy. Section 4 designs a real number and the relationship between the real number confidentiality collaborative determination protocol. In section 5, the correctness and security of the protocol are analyzed, and simulation examples are used to prove that the protocol is secure. Section 6 analyzes the performance of the protocol, and Section 7 presents the specific extended applications of the three protocols. Section 8 summarizes this paper and forecasts future research directions.
Preparatory knowledge
Security definition
Semihonest participant [24]: In the secure multiparty computation protocol, participants are divided into three types according to their behaviors in the protocol: honest participants, semihonest participants and malicious participants. A semihonest participant in the implementation of the protocol will follow the protocol process in an honest way, but he may be corrupted by the attacker who discloses all his inputs, outputs and intermediate results to the attacker or deduces the information beyond the protocol or that of others based on the information he possesses.
Protocol security under the semihonesty model: According to Goldreich’s study [24], since the secure multiparty protocol under the semihonesty model can be transformed into the new protocol under the malicious model in most cases, this paper only designs the protocol under the semihonesty model and gives the corresponding security simulation examples.
Assume that the two parties involved in the calculation are Alice and Bob. Alice owns x and Bob owns y. They need to cooperate in the calculation of function f(x,y) = (f1(x,y),f2(x,y)) on the premise of ensuring the privacy of x and y. The purpose of the collaborative computation is that Alice and Bob obtain the two components of f and of f1(x,y) and f2(x,y), respectively. Let π represent the calculated protocol of f, and the information sequences obtained by Alice and Bob during the implementation of the protocol are respectively recorded as:
(1)
(2)
where r1 and r2 represent the independent random numbers of Alice and Bob, respectively; and
represents the ith message received by Alice. After the execution of protocol π, the output of Alice is denoted as f1(x,y).
represents the jth message received by Bob. After the execution of protocol π, Bob obtains the output, which is denoted as f2(x,y).
Definition: For protocol π that computes function f, the probabilistic polynomial time algorithms S1 and S2 are as follows:
(3)
(4)
Therefore, π computes the function f confidentially, where is computationally indistinguishable.
Therefore, in the calculation of the two sides in the process of those protocols, only information from their input and output calculations can be obtained and the participants are unable to obtain the other party’s privacy information, thus proving that multiparty computation protocols are safe. You need to construct (3) and (4) set up the simulators of S1 and S2, respectively; therefore, the security method is called simulation examples.
Paillier homomorphic encryption system
The Paillier encryption system is specifically described as follows [25].
Key generation: Select two large prime numbers p and q to calculate N = pq and λ = lcm(p−1,q−1). Define function and randomly select a generator
to make gcd(L(gλ mod N2),N) = 1; then, the public key and private key of the encryption scheme are (g,N) and λ, respectively.
Encryption process: For plaintext m<N, random number r<N is selected to calculate ciphertext c = E(m).
Decryption process: For ciphertext c, calculate plaintext m = D(c).
Additive homomorphism: Because the following property is true,
(7)
the Paillier encryption algorithm has additive homomorphism.
Homomorphic multiplication: Because the following property is true,
(8)
the Paillier encryption algorithm has homomorphism multiplication.
ElGamal homomorphic encryption system
The ElGamal encryption system is described as follows [26].
Key generation: Select parameter k, generate a large prime number p of k bits and a generator , and randomly select
as the private key; then, the corresponding public key is h = gx mod p.
Encryption process: For plaintext , random number r is selected to calculate the ciphertext.
Decryption process: For ciphertext c, calculate the plaintext m = D(c).
Multiplicative homomorphism: Since the following property is true,
(11)
the ElGamal encryption algorithm has multiplicative homomorphism.
Bernoulli inequality
The Bernoulli inequality is described as follows.
For any integer n and for any real number h, the following inequality holds:
(12)
If n is positive and even, the Bernoulli inequality can be extended to any real number h∈R, that is:
(13)
Identification: When h>−1, the original inequality shows that for any integer n, (1+h)n≥1+nh is true.
When h≤−1, since n is even, (1+h)n≥0, 1+nh≤1−n<0, and (1+h)n≥1+nh are true.
Therefore, when n is even, the range of h in (1+h)n≥1+nh is any real number.
According to the promotion, we can derive the following two properties:
Property 1: For any real numbers x and y, n takes any even number. Then, if ,
, that is, y≥x.
Property 2: For any real numbers x and y, n takes any even number. Then, if ,
, that is, y≤x.
Monotonic function
In general, let the domain of the function f(x) be I. Regarding the values of x1 and x2, for any two independent variables belonging to an interval of I, when x1>x2, f(x1)>f(x2), and then f(x) is an increasing function on this interval. When x1>x2, f(x1)<f(x2), and then f(x) is a negative function on this interval.
Collaborative calculation of the size between real numbers to protect privacy
Problem description and calculation principle
Problem description: Alice has a real number x and Bob has a real number y (Fig 1). Through collaborative calculation, the two collaborative calculators can compare the size of the real number data they hold without revealing their own data information.
Calculation principle: For any two real numbers x and y, according to the generalization of the Bernoulli inequality above, for any even number n, if , then y≥x; and if
, then y≤x. In order to protect the data privacy, any positive even n value passed by the protocol in each round later in this paper is randomly generated. For the residual case, this paper uses a homomorphic encryption system to construct a monotonic function containing the residual interval.
Specific protocol
Protocol 1. Collaborative calculation of the size between real numbers to protect privacy
Input: Alice has a real number x, and Bob has a real number y.
Output: The size comparison of x and y results in sign(x,y).
- Alice sets a random positive even number n to construct
. Then, Alice sends it to Bob.
- Bob calculates sign(t,y), that is, Bob compares the size of y and t and returns the result sign(t,y) = -1. Then, the process ends. Otherwise, go to step 3.
- Alice sets a random positive even number n′ to construct
and then sends it to Bob.
- Bob calculates sign(s,y), that is, Bob compares the sizes of y and s and returns the result sign(s,y) = 1. Then, the process ends. Otherwise, go to step 5.
- Bob selects Paillier, a homomorphic encryption mechanism, to obtain (g,N) and λ. Then, he encrypts his data value y to obtain ciphertext E(y), E(y2) and sends it to Alice.
- Alice selects random numbers α, β and γ to construct the monotonic function containing (s,x) in the defined domain, such as monotonic increasing function f(x) = αx2+βx+γ to calculate f(s) and f(x). At the same time, Alice performs a homomorphism operation on the received E(y), E(y2) to obtain ciphertext c = E(y2)α E(y)β E(γ) = E(αy2+βy+γ). Then, Alice sends f(s), f(x) and c to Bob.
- After Bob decrypts the ciphertext c received, he gets f(y); and then he compares the sizes of f(s), f(x) and f(y). If f(s)≤f(y)≤f(x), output sign(x,y) = 1. Otherwise, output sign(x,y) = -1.
Protocol analysis: In the first four steps in the protocol, Alice constructs x into new values t and s by selecting random positive even numbers, and then these are sent to Bob. On his side, Bob simultaneously calculates the rules of the calculation result according to the symbol function and returns the value. Therefore, those involved in the simultaneous calculations of the two sides are unable to get any information on the other side. In the second part of the protocol, Bob’s master private key and his own y value encryption will be sent to Alice, so Bob’s information is not leaked to Alice. In addition, the monotonic function is constructed and mastered by Alice, and Bob cannot solve the monotonic function according to f(s) and f(x).
Next, we use the multiplicative homomorphism of the ElGamal encryption system to construct a similar protocol to solve the problem of the collaborative calculation of the size comparison between real numbers that protect privacy.
Protocol 2. Collaborative calculation of the sizes of real numbers to protect privacy
Input: Alice has a real x, and Bob has a real y.
Output: Size comparison of x and y results in sign(x,y).
- Alice sets a random positive even number n to construct
. Then, she sends it to Bob.
- Bob calculates sign(t,y), that is, Bob compares the sizes of y and t and returns the result sign(t,y) = -1. Then, the process ends. Otherwise, go to step 3.
- Alice sets a random positive even number n′ to construct
and then sends it to Bob.
- Bob calculates sign(s,y), that is, Bob compares the sizes of y and s and returns the result sign(s,y) = 1. Then, the process ends. Otherwise, go to step 5.
- Bob selects ElGamal a homomorphic encryption mechanism, to obtain (g,N) and λ. Then, he encrypts his data value y to obtain ciphertext E(y), E(y2) and sends it to Alice.
- Alice selects random numbers α, β and γ to construct the monotonic function f(x) containing (s,x) in the defined domain, the coefficients of function variables are required to be independent of the order of random numbers, to calculate f(s) and f(x). At the same time, Alice performs a homomorphism operation on the received E(y) to obtain ciphertext c. Then, Alice sends f(s), f(x) and c to Bob.
- After Bob decrypts the ciphertext c received, he gets f(y), and then compares the sizes of f(s), f(x) and f(y). If f(s)≤f(y)≤f(x), sign(x,y) = 1 is output. Otherwise, sign(x,y) = -1 is output.
Confidential collaborative determination of the interval relationship between real numbers
Problem description and calculation principle
The problem description assumes that one of the two parties involved in the collaborative calculation has a real number and the other has an interval of real numbers. The two parties should work together to calculate the relationship between the real number and the interval of real numbers without revealing their respective data information. For example, Alice has a real number [s,x] and Bob has a real number interval y, and the two should secretly work together to determine the relationship between the real number and the interval of real numbers.
In order to determine whether a real number is in an interval, the calculation principle can determine whether a real number is in an interval by calculating the sign of the difference between the real number and the value at both ends of the interval, that is, it can determine whether a real number is in an interval of real numbers by using a sign function. For example, for a real number point y, to determine whether y is in an interval of [s,x], then the sign of sign(y,[s,x]) = sign((x−y)(y−s)) can be determined.
From the above expansion, we can find the result value of sign(y(x+s)−xs−y2).
Specific protocol
Protocol 3. Confidential collaborative determination of the interval relationship between real numbers
Input: Alice inputs real number [s,x], and Bob inputs real number interval y.
Output: Bob outputs sign(y,[s,x]).
The protocol constructed in this paper is as follows:
- Alice selects Paillier, a homomorphic encryption mechanism, and obtains (g,N) for the public key and λ for the private key. Alice calculates c1 = −xs and c2 = x+s based on her data values s and x, encrypts c1 and c2, and obtains ciphertext E(c1) and E(c2). Then, she sends them to Bob.
- Bob generates a random number v, encrypts the random number E(v). Then, Bob calculates E(v), y together with the received E(c1) and E(c2) as follows:
- Bob sends
to Alice.
- Alice decrypts
to obtain
and sends
to Bob.
- Bob calculates:
- If
, y is in the interval [s,x] or y is at the end point of the interval [s,x]; and
means that y is outside the interval [s,x]. Then, Bob sends the result to Alice.
Protocol analysis: In Protocol 3, Alice’s data value s and x was mixed and encrypted before being sent to Bob who could not decrypt it. Bob added a random number v during the encryption operation, so although Alice decrypted , Alice could not obtain the specific information of y due to the existence of v.
Correctness and safety analysis
Correctness analysis
Protocol 1, in steps 1 to 4, according to the generalized properties 1 and 2 of Bernoulli inequality, the protocol can correctly calculate the size of the variables x and y and reduce the range of sizes to (s,t). In step 6, Alice chooses random numbers α, β and γ, the tectonic domain range contains the monotonic function of (s,x), and Alice calculates . In step 7, Alice unlocks c and accesses f(y). According to the nature of the monotonic function, s, x, and y are consistent with f(s), f(x) and f(y), respectively; therefore, through comparing the sizes of f(s), f(x) and f(y), the function can be calculated within the scope of the (s,t) and y and the sizes of s, x, and y.
Similarly, the correctness analysis of Protocol 2 is similarly verifiable.
In Protocol 3, Bob calculates:
Alice decrypts to get . In step 4, Bob replaces v with −y2 to obtain y(x+s)−xs−y2 = (x−y)(y−s). Then, the specific sign value can be calculated according to the sign function. Therefore, protocol 3 is correct.
Security analysis
Theorem 1. Protocol 1 can determine the size relationship between real numbers in a cooperative and confidential manner.
Proof: For the convenience of the description, this paper divides protocol 1 into two parts: part 1 is the first 4 steps, and part 2 is steps 5~7.
First, we will prove that the data are safe during the first 4 steps of the protocol’s execution.
In the first and third steps of the protocol, there are positive even numbers n and n′ randomly selected by Alice, and t and s are constructed. Because Bob does not obtain the values of n and n′, he cannot obtain the specific information for Alice.
In steps 2 and 4 of the protocol, Bob calculates according to information t and s his receives and his own data, and he only sends the symbol of the calculated result back to Alice, so Alice cannot obtain Bob’s specific information. Therefore, the first 4 steps of the protocol are safe.
The following simulation example is used to strictly prove the security of steps 5~7 of the protocol, that is, the simulators are constructed to make formulas (1) and (2) hold in the security definition.
In this protocol, let f1(x,y) = f2(x,y) = sign(x,y), and construct simulator S1. S1 accepts (x,f1(x,y)) as its input and proceeds as follows:
Step 5: Accept input (x,f1(x,y)) = (x,sign(x,y))
Since S1 has sign(x,y), it can pick any y′ that satisfies sign(x,y) = sign(x,y′).
y′ is encrypted according to protocol S1 to obtain ciphertext E(y′).
Step 6: S1 selects a random number α′, β′ and γ′ constructs the monotonic function containing (s,x) in the defined domain interval, and calculates h(s) and h(x). Simultaneously, it calculates ciphertext .
Step 7: After S1 decrypts ciphertext c′, it obtains h(y′) and calculates sign(h(s),h(y′)) and sign(h(x),h(y′)). If sign(h(s),h(y′)) = -1 and sign(h(x),h(y′)) = 1, output sign(x,y′) = 1. Otherwise, output sign(x,y′) = -1.
Since α, β, γ, α′, β′ and γ′ are random numbers and f(y) = αy2+βy+γ, h(y′) = α′y′2+β′y′+γ′ and are derived.
Since c = E(αy2+βy+γ), c′ = E(α′y′2+β′y′+γ′), α, β, γ, α′, β′ and γ′ are random numbers and c and c′ are the same as the public key algorithm encryption results, c and c′ are indivisible, that is, .
Therefore, .
Similarly, simulator S2 can be constructed in a similar way so that:
Therefore, protocol 1 can confidentially calculate the size relationship between real numbers.
Theorem 2. Protocol 2 can determine the size relationship between real numbers in a cooperative and confidential manner.
The proof of theorem 2 is similar to that of theorem 1 and will not be detailed in this article.
Theorem 3. Protocol 3 can determine the relationship between real points and intervals in a cooperative and confidential manner.
Identification: The security of the protocol is strictly proven by the simulation example below, that is, the emulators are constructed to make formula (1) and formula (2) hold in the security definition.
In this protocol, let f1(y,[s,x]) = f2(y,[s,x]) = sign(y,[s,x]) and construct the simulator S1. S1 accepts (y,f1(y,[s,x])) as the input and proceeds as follows:
Step 1: S1 accepts input (y,f1(y,[s,x])) = (y,sign(y,[s,x])). Since S1 has sign(y,[s,x]), it picks any [s′,x′] that satisfies sign(y,[s,x]) = sign(y,[s′,x′]). and
are calculated according to protocol S1, and
and
are encrypted to obtain ciphertext
and
, respectively.
Step 2: S1 generates a random number v′, encrypts the random number E(v′), and computes: .
Step 3: After S1 decrypts D, .
Step 4: Calculate .
Since sign(y,[s,x]) = sign((x−y(y−s)), sign(y,[s′,x′]) = sign((x′−y)(y−s′)), and
sign(y,[s,x]) = sign(y,[s′,x′]), sign((x−y)(y−s)) = sign((x′−y)(y−s′)).
Since and
are the same as the public key algorithm encryption results,
and
are inseparable, namely,
. Thus:
Similarly, simulator S2 can be constructed in a similar way so that:
.
Therefore, protocol 3 can confidentially calculate the relationship between real points and intervals.
Efficiency analysis
This section analyzes the efficiency of Protocols 1, 2 and 3 and comparatively analyzes protocol 3 and protocol 1 in references [23] and [8] and protocol 3 in this paper. Because the protocol uses a homomorphic encryption mechanism, the number of costly modular exponentiation operations is taken as an indicator to measure the computing costs while the other operations are ignored. In the Paillier encryption scheme, one encryption or decryption requires two modular exponentiation operations. In the ElGamal encryption scheme, one encryption requires two modular exponentiation operations, and one decryption requires one modular exponentiation operation.
Computational complexity analysis and communication complexity analysis: Protocol 1 and Protocol 2 have negligible computational overheads in the first four steps. In the fifth to seventh steps of Protocols 1 and 2, both Alice operations need two modular exponentiation operations, and Bob performs encryption and decryption once each. Therefore, no more than six modular exponentiation operations are required in Protocol 1, and no more than five modular exponentiation operations are required in Protocol 2. Although protocol 1 and Protocol 2 need to perform 6 (or 5) modular exponentiation operations in the worst case, the protocol in this paper can complete the computations without requiring modular exponentiation operations in the best case.
Protocol 3 in reference [23] requires 13 modular exponentiation operations and 2 rounds of communication. Protocol 1 in reference [8] requires 12 modular exponentiation operations and 2 rounds of communication. In protocol 3 in this paper, Alice encrypts twice and decrypts once, which requires 6 modular exponentiation operations, Bob encrypts once and conducts ciphertext modular exponentiation operations once, which requires 3 modular exponentiation operations, a total of 9 modular exponentiation operations, and 2 rounds of communication.
In order to verify the efficiency of the protocol, we used the Java programming language to implement protocol 3 and the comparison protocol.
The experimental test environment is as follows: the operating system is the 64-bit Windows7 flagship version operating system, the processor is an Intel(R) Core(TM) i5-3470 3.20 GHz, and the amount of memory is 8.00 GB. The set value of each group was averaged after 1000 experiments. In the experiment, the large prime p and q bits used in the Paillier encryption algorithm are the same, both of which are 256 bits.
As seen in Tables 1 and 2, protocol 3 in this paper has fewer scheme modular exponentiation operations and has higher efficiency. Both the theoretical analysis and experimental results show that the protocol in this paper is efficient.
Extended applications
Confidential data query
The problem can be described as follows: one party participating in collaborative computing has an ordered data set, and the other party has a value to be searched. The two parties should cooperate to determine the specific location of the value in the data set without revealing their respective data information. For example, Alice has ordered data set {c1,c2,⋯cn}, Bob has data set s, and the two should work together confidentially to determine the specific location of numerical value s in data set {c1,c2,⋯cn}. Therefore, using binary search, protocol 1 or 2 can be used to compare the median of the data to be checked and the narrowing range of the data set for multiple times to achieve the required results.
Cooperative determination of the relationship between real number intervals to protect privacy
The problem can be described as follows: the two parties involved in the collaborative calculation have a real interval, and they should work together to calculate the relationship between the two intervals without revealing the numerical information of their respective intervals. For example, Alice has an interval [x1,x2], Bob has an interval [y1,y2], and they work together confidentially to determine the relationship between the two intervals. As shown in the Figs 2 and 3, the relationship between two real intervals can be divided into three categories: separation, intersection and overlap. This paper adopts the following methods to address this problem:
- Alice calculates the magnitude of the interval [x1,x2] where t = |x2−x1|, and Bob calculates the magnitude of the interval [y1,y2] where s = |y2−y1|. Alice and Bob compare the sizes of t and s.
- If x2<y1, then the left phase of the interval [x1,x2] is separated from the interval [y1,y2]; and if x1>y2, then the right phase of the interval [x1,x2] is separated from the interval [y1,y2].
- When t<s, x2>y1>x1. If y2>x2>y1, then the left part of the interval [x1,x2] intersects at the interval [y1,y2]; and if y2>x1>y1, then the right part of the interval [x1,x2] intersects at the interval [y1,y2]. Otherwise, if y1,y2 is less than x2 and greater than x1, then the interval [y1,y2] overlaps within the interval [x1,x2].
- When t<s, x2>y1>x1, and then the left part of the interval [x1,x2] intersects the interval [y1,y2]; and if x2>y2>x1, then the right part of the interval [x1,x2] intersects the interval [y1,y2]. Otherwise, if x1,x2 is less than y2 and greater than y1, then the interval [x1,x2] overlaps within the interval [y1,y2].
In conclusion, the above scheme can be implemented by means of protocol 1 or 2 and Protocol 3 in this paper.
Conclusion and discussion
The determination of the relation between a number and a numerical interval is one of the core problems of scientific calculation to protect privacy, and the calculation of the relation between two numbers and numerical intervals on the premise of protecting privacy is also the basic problem of collaborative calculation. At present, most of the solutions reach the integer level while few reach the real number level. This article uses the Bernoulli inequality extension type and combines it with the monotonic function technique to extend the numerical interval to determine the relationship between the real number level, mainly the homomorphic encryption scheme based on two different design size comparisons between the two new real numbers. The Bernoulli inequality extension type reduces the scope of use of the homomorphic encryption system comparison to the range, reduces the encryption algorithm, and improves the efficiency. In addition, a protocol is designed to solve the confidential cooperative determination problem between real numbers by using symbolic functions and other techniques. The protocols in this paper are based on the fact that all parties involved in collaborative computing are semihonest, and the constructed protocols are secure under the semihonest model. The relationship between the number of privacy protections and the numerical interval under the malicious model will be the direction of our future work.
References
- 1.
Yao A C. Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science. IEEE; 1982. p. 160–164.
- 2.
Goldreich O, Micali S, Wigderson A. How to play any mental game. In: Proceedings of the 19th Annual ACM Conference on Theory of Computing. ACM; 1987. p. 218–229.
- 3. Yong-long Luo, Liu-sheng Huang, et al. Privacy-preserving Cross Product Protocol and Its Applications. Chinese Journal of Computers. 2007;30(02):248–254.
- 4. SHEN E, VARIA M, CUNNINGHAM R K, et al. Cryptographically secure computation. Computer. 2015;48(4):78–81.
- 5.
O. Goldreich. Secure multi-party computation. Manuscript Preliminary version. 1998; 78.
- 6. Fagin Ronald, Naor Moni, Einkler Peter. Comparing information without leaking it. Communications of the ACM. 1996;39(5):77–85.
- 7.
Du Wenliang, J. Atallah. Privacy-preserving cooperative scientific computations. In: Proceedings of the 14th IEEE Computer Security Workshop. IEEE; 2001. p.273-282.
- 8. DOU Jiawei, WANG Wenli, LIU Xuhong, et al. Secure Multiparty Computation of Rational Interval and Its Applications. Chinese Journal of Electronics. 2018;46(9):2057–2062.
- 9. CHEN Z H, LI S D, WANG D S, et al. Protocols for secure computation of set-inclusion with unencrypted method. Journal of Computer Research and Development. 2017;54(7):1549–1556.
- 10.
R. Agrawal and S. Ramakrishnan. Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data. ACM; 2000. p. 439–450.
- 11. Lindell Y., Pinkas B. Privacy preserving data mining. Journal of Cryptology. 2002;15(3):177–206.
- 12.
Du Wenliang, J. Atallah. Secure multi-party computation problems and their applications: A review and open problems. New Security Paradigms Workshop. 2001:11–20.
- 13.
J. Atallah, Du Wenliang. Secure multi-party computational geometry. In: Proceedings of the 7th International Workshop on Algorithms and Data Structures. Springer-Verlag; 2001. p. 165–179.
- 14. LI S D, WU C Y, WANG D S, et al. Secure multiparty computation of solid geometric problems and their applications. Information Sciences. 2014;282:401–413.
- 15. LU Shao-feng, LUO Yong-long. Privacy-preserving in Graham algorithm for finding convex hulls. Computer Engineering and Applications. 2008;44(36):130–133.
- 16.
R. Beigel, L. Fortnow and W. Gasarch. A nearly tight lower bound for private in formation retrieval protocols. Technical Report TR03-087, Electronic Colloquium on Computational Complexity (ECCC), 2003.
- 17.
Du W L, Han Y S, Chen S G. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In: Proceedings of the 4th SIAM International Conference on Data Mining. Lake Buena Vista, Florida; 2004. p. 222–233.
- 18. LIU Wen, LUO Shou-shan, CHEN Ping. Solution of secure multi-party multi-data raking problem based on elgamal encryption. Journal on Communications. 2007;28(11):1–5.
- 19. LI Shundong, ZHANG Xuanping. Secure Multi-Party Computation Protocol for Sorting Problem. Journal of Xi’an Jiaotong University. 2008;42(02):231–233.
- 20. ChunMing TANG, GuiHua SHI, ZhengAn YAO. Secure multi-party computation protocol for sequencing problem. SCIENTIA SINICA Informationis. 2011;41: 789–797.
- 21.
M. Ben-Or, C. Crepeau, D. Gottesman, A. Hassidim and A. Smith. Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority. 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06), 2006, pp. 249–260. https://doi.org/10.1109/FOCS.2006.68
- 22. Costa B, Branco P, Goulão M, Lemus M, Mateus P. Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting. Entropy. 2021; 23(8):1001. pmid:34441141
- 23. GUO Yi-Min, ZHOU Su-Fang, et al. Efficient Privacy-Preserving Interval Computation and Its Applications. Chinese Journal of Computers. 2017;40(7):1664–1679.
- 24.
Goldreich O. Foundations of Cryptography: Basic Applications. London: Cambridge University Press; 2004. pp. 599–729. https://doi.org/10.1080/J003v18n01_06 pmid:23944665
- 25.
Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology- EUROCRYPT’99. Berlin: Springer-Verlag; 1999. p. 223–238.
- 26. ELGAMAL T. A public key cryptosystem and a signature scheme based on discrete logarithms. Information Theory, IEEE Transactions on. 1985;31(4):469–472.