Proceedings of the International Academic Summer Conference on Number Theory and Information Security (NTIS 2023)

Secure Two-party Computation for Equality of Bilateral Data Based on Pinhole Camera Model

Authors
Changfeng Gui1, *, Mengsi Han2, Wei He3, Zhantong Xie1
1Faculty of Science and Technology, University of Macau, Macau, P. R. China
2Hunan Zeta Technology Limited, Changsha, P. R. China
3School of Mathematics and Statistics, Central South University, Changsha, P. R. China
*Corresponding author. Email: changfenggui@um.edu.mo
Corresponding Author
Changfeng Gui
Available Online 2 August 2024.
DOI
10.2991/978-94-6463-463-1_2How to use a DOI?
Keywords
Secure Multi-party Computation; Data equality test; Semi-honest model; key steam
Abstract

Secure two-party computation is always the focus in the international cryptographic community, and establishing a secure two-party computation for determining the equality of data is a fundamental and crucial task within this field. There is still substantial room for improvement in terms of efficiency and security, so it is worth exploring further. In this paper, two theorems are proved from camera imaging of straight lines on a flat surface and the equality judgement of data between the two-party is innovatively converted into judging whether the inner products of the vectors owned by the two parties are zeroes. Based on the specific property of these vectors, a security protocol is established to determine whether those inner products are zeroes, which realizes the protocol scheme of judging the data equality of two-party under the semi-honest model and analyses its security theoretically. The scheme needs key stream for dynamic data encoding, since only basic arithmetic operations (integer addition, subtraction and multiplication) and a final modulus operation are required after encode without high-order and decimal operations, and the communication complexity is O(1), which greatly improves the efficiency. This scheme may not fit for malicious model, we could use the existing agreements of malicious model to determine whether those inner products are zeroes, by the conversion in this paper we also could complete the equality judgement.

Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the International Academic Summer Conference on Number Theory and Information Security (NTIS 2023)
Series
Advances in Physics Research
Publication Date
2 August 2024
ISBN
978-94-6463-463-1
ISSN
2352-541X
DOI
10.2991/978-94-6463-463-1_2How to use a DOI?
Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Changfeng Gui
AU  - Mengsi Han
AU  - Wei He
AU  - Zhantong Xie
PY  - 2024
DA  - 2024/08/02
TI  - Secure Two-party Computation for Equality of Bilateral Data Based on Pinhole Camera Model
BT  - Proceedings of the International Academic Summer Conference on Number Theory and Information Security (NTIS 2023)
PB  - Atlantis Press
SP  - 4
EP  - 21
SN  - 2352-541X
UR  - https://doi.org/10.2991/978-94-6463-463-1_2
DO  - 10.2991/978-94-6463-463-1_2
ID  - Gui2024
ER  -