Literature DB >> 27652062

Secure multiparty computation of a comparison problem.

Xin Liu1, Shundong Li2, Jian Liu3, Xiubo Chen4, Gang Xu5.   

Abstract

Private comparison is fundamental to secure multiparty computation. In this study, we propose novel protocols to privately determine [Formula: see text], or [Formula: see text] in one execution. First, a 0-1-vector encoding method is introduced to encode a number into a vector, and the Goldwasser-Micali encryption scheme is used to compare integers privately. Then, we propose a protocol by using a geometric method to compare rational numbers privately, and the protocol is information-theoretical secure. Using the simulation paradigm, we prove the privacy-preserving property of our protocols in the semi-honest model. The complexity analysis shows that our protocols are more efficient than previous solutions.

Entities:  

Keywords:  Comparison problem; GM encryption scheme; Secure multiparty computation; Vector encoding method

Year:  2016        PMID: 27652062      PMCID: PMC5011474          DOI: 10.1186/s40064-016-3061-0

Source DB:  PubMed          Journal:  Springerplus        ISSN: 2193-1801


Background

The Millionaires’ Problem is first proposed by Yao (1982). The problem is described as follows: Alice and Bob have their own wealth x and y million, respectively; they want to know who is richer without disclosing their wealth. The Millionaires’ Problem is abstracted as Greater Than or GT problem. The GT problem has been developed into secure multiparty computation (SMC). The SMC studies the following problems: two or more parties want to jointly compute a function f. In these situations, the parties get correct results, but do not disclose their own inputs to others. Goldreich et al. (1987) proposed a general theoretical solution to all SMC problems using the circuit evaluation and defined the SMC security (Goldreich 2004). However, using the general SMC solution to all problems is impractical for efficiency reason. So Golidreich further pointed that we should study specific solutions to different problems in practice. In addition, Goldwasser (1997) predicted that SMC, which was a powerful tool and had rich theoretical basis but whose real-life usage was only beginning, would become an integral part of our computing reality in the future. Motivated by the prediction, researchers have studied many specific SMC solutions, including private sorting (Liu et al. 2012), private determining the relationship of sets (Dachman-Soled et al. 2012), private computional geometry (Shundong et al. 2014), private voting (Toft 2011), and private data mining (Bogdanov et al. 2012; Fu et al. 2015b) etc. At present, SMC protocols are studied in either the semi-honest model or the malicious model, and proposing a SMC protocol in the malicious model is more difficult than in the semi-honest model. However, Goldreich designed an important compiler. Given a protocol that privately computes a function f in the semi-honest model, his compiler can produce a new protocol that privately computes f in the malicious model. In addition, some SMC problems have not been efficiently solved and some SMC problems are not solved even in the semi-honest model (Gu et al. 2015; Xia et al. 2015; Pan et al. 2015; Ren et al. 2015). So we propose our protocols in the semi-honest model. The GT problem is a building block of many SMC protocols (Shim 2012; Zhang et al. 2011; Banu and Nagaveni 2013; Lin et al. 2014; Fu et al. 2015a; Hong and Sun 2016). Cryptographic researchers have proposed some GT protocols. Cachin (1999) proposed a GT protocol based on the -hiding assumption, but this protocol need a trusted third party. Ioannidis and Grama (2003) used the oblivious transfer (OT) scheme to construct a GT protocol, but the length of inputs was restricted by a secure parameter of the OT scheme. Fischlin (2001) used the Goldwasser–Micali encryption scheme to construct a two-round GT protocol, and its computation cost is () modular multiplications (d is the length of private inputs, is set to 40–50). Later, Li et al. (2005) constructed a function F to compare two function values instead of plaintexts, and used the scheme to compare any data. Schoenmakers et al. (2004) used a threshold homomorphic encryption scheme to solve the GT problem, in which inputs was shared among a group of parties. The communication cost was O(n). Blake and Kolesnikov (2004) used the Paillier encryption schemem to construct a two-round GT protocol whose computation cost was modular multiplications. Lin and Tzeng (2005) proposed a two-round GT protocol using the ElGamal multiplicatively homomorphic encryption scheme and a 0–1 encoding method, and the computation cost was modular multiplications. Grigoriev and Shpilrain (2014) used a public encryption scheme to solve the Millionaires’ Problem with two-round communications and computation costs is modular multiplications. Maitra et al. (2015) proposed a two-round protocol to solve the Millionaires’ Problem with computation costs of modular multiplications. However, some previous GT solutions just compare integers, some of them cannot determine , or in one execution, some of them need a trusted third party, and some of them are inefficient. In this study, we propose new solutions to the GT problem. We introduce a 0–1-vector encoding method, and use the Goldwasser–Micali (abstracted as GM) encryption scheme to compare integers efficiently. Then we present a protocol to privately compare rational numbers in one execution by computing the area of a triangle. Our contribution:The rest of this paper is organized as follows: We introduce a 0–1-vector encoding method which is used to encode a number into a vector. Using the encoding method, we can transform the comparison problem into a vector-element-selecting problem. This method is more efficient than directly comparing two numbers. We propose a private comparison protocol for integers based on the XOR homomorphism of the GM encryption scheme and the vector encoding method. Its computation cost for a vector of length L is () modular multiplications and the communication cost is two rounds at most. Further, we use a geometric method to privately compare two rational numbers. By privately computing the sign of a triangle area , we determine whether , or in one execution. The protocol just needs five additions and eight multiplications, so its computation cost can be neglected and its communication cost is one round. The protocol is information-theoretical secure. “Related work” section introduces related definitions and methods, including the ideal SMC model, the semi-honest model, the simulation paradigm, the Goldwasser–Micali encryption scheme, the 0–1-vector encoding method, and the secure computation method of the area of a triangle; “New protocols to privately solve a comparison problem” section proposes new protocols for comparing integers and rational numbers, shows the correctness and security analysis of our protocols, and proves their privacy-preserving property using the simulation paradigm; “Complexity analysis” section compares the computational and communication complexity of our protocols with previous solutions; “Conclusion” section concludes this work.

Related work

Ideal SMC model

The ideal SMC model is the simplest SMC model. It needs a trusted third party (TTP), who always tells the truth, never lies, and never discloses any input information. So the ideal SMC protocol is the most secure. If such a TTP exists, Alice (holding x ) and Bob (holding y ) can privately compute f(x, y) as follows:Theoretically, the above protocol can solve any SMC problems, but the TTP cannot be easily found in practice. So we need to study SMC protocols without TTP. Alice sends x to TTP; Bob sends y to TTP; TTP computes ; TTP sends the result to Alice and Bob.

Semi-honest model

We assume that all parties are semi-honest. A semi-honest party truthfully follows a protocol and sends correct inputs to others, except that he may record all intermediate computation and try to derive other parties’ private inputs from the record. Goldreich has proved that, a protocol which can privately compute a functionality f in the semi-honest model can be complied, by introducing a bit commitment macro, into another protocol which can compute the functionality f in the malicious model. The semi-honest model is not only an important methodological tool but may also provide a good model in many settings. It suffices to prove that a protocol is secure in the semi-honest model. If the information that a party efficiently computes from the execution of a protocol can also be efficiently computed on its input and output, the protocol is private. This intuition is formalized by the simulation paradigm. That is, a party’s view in a protocol execution can be simulated by its input and output. If so, the parties learn nothing from the protocol execution itself, and the protocol is private. Notations and definition are following: Notations: Alice holds x, and Bob holds y in a two-party SMC protocol. Alice and Bob’s inputs are x, y, respectively; They propose a protocol to compute a function f, where f is a probabilistic polynomial time functionality; Alice and Bob obtain message sequences and , respectively, where or is the result of her or his internal coin toss, and or is her or his received message; Alice’s output is , and Bob’s output is .

Definition 1

For a function privately computes f if there exists a probabilistic polynomial time algorithm, denoted by simulators and , such that:where denotes computational indistinguishability. To prove that a multiparty computation protocol is private, we must construct the simulators and such that (1) and (2) hold.

Goldwasser–Micali public key cryptosystem

A multiplicative group of is . Let . a is called a quadratic residue modulo n if there exists an such that . If no such x exists, a is called a quadratic non-residue modulo n. For any is always a quadratic residue modulo n. The Goldwasser–Micali (GM) public key cryptosystem (Goldwasser and Micali 1984) is the first probabilistic cryptosystem based on the fact that if t is quadratic nonresidue, then so is for any , and which consists of following three algorithms: Key generation: Takes a security parameter k as an input. The GM encryption scheme chooses two k-bit primes p and q, sets , and picks a ( is the subset of containing the elements with Jacobi symbol) such that t is a quadratic nonresidue modulo n. It then publishes (n, t) as public keys, and keeps the private keys (p, q) secret. Encrypt: Takes a message as input, the public key , and a random number r. It encrypts as follows:Decrypt: Based on the private key (p, q), it decrypts as follows:where is the Legendre symbol, which is defined as follows:Homomorphism: The GM encryption scheme has homomorphism, that is:From the above observation, it shows that and the plaintexts , so the GM encryption has XOR homomorphism.

Vector encoding method

In this subsection, we introduce a vector encoding method. The vector encoding method can encode a natural number k into a vector v as follows: The vector of a number k is encoded as follows:where .

Privately computing the area of a triangle

Li et al. (2010) have proposed a SMC protocol of computing the area of a triangle, as follows. Suppose that there is a triangle with three vertices , the area of is computed without security requirements as follows:where the sign of is positive if and only if form a counterclockwise cycle, and negative if and only if form a clockwise cycle. The Formula (4) can be rearranged as follows:Let , soBy Formula (6), we can privately compute the sign of . Correctness and security: In the protocol, Alice knows and . If are integers and , Alice can compute r by . To avoid this situation, r should be selected by the form (), such as 5.425, 17.8125 or their multiple (Li et al. 2010). In the protocol, Alice may get the slope k of a line by computing , but she cannot determine which line with the slope k and cannot obtain and , because there are three equations with five unknown variables. For Bob, the protocol is secure. By the result, Bob just obtains , and cannot compute and . For Alice, the protocol is secure.

Theorem 1

Protocol 1 is private. The conclusion is proved by showing two simulators and such that formulas (1) and (2) hold.

Proof

We first construct to simulate Alice’s computation. In view of and the slope selects two points and a random number that satisfy . computes Note that in this protocol. LetSince and are arbitrary points on a plane, they are computationally indistinguishable. The results obtained by applying deterministic computation to computationally indistinguishable objects are still computationally indistinguishable. Therefore, and are computationally indistinguishable. Therefore,Now, we construct . In view of and selects a point and simulates as follows: 1. computes2. computes3. Bob knows the sign of , that is, . Since and are two arbitrary points that satisfythese two points are computationally indistinguishable. Note that in the protocolLetBy the method we choose , and it must hold that , therefore and are computationally indistinguishable. It follows thatThis completes the proof.

New protocols to privately solve a comparison problem

In this work, we propose new protocols to solve the private comparison problem for integers and rational numbers. For the integer comparison problem, we use a 0–1-vector encoding method and the GM encryption scheme. For the rational numbers comparison problem, we use the method for computing the area of a triangle to determine the relationship of x and y in one execution privately. We analyze the correctness and security of our protocols, and prove their privacy-preserving property using the simulation paradigm.

Privately solving a comparison problem for integers

Alice and Bob hold their own numbers x, y, and they do not want to disclose their numbers when they execute the protocol. Alice uses the 0–1-vector encoding method to map x into a vector X and encrypts X by the GM encryption scheme. Bob selects an element from the ciphertexts of the vector X and encrypts the element using the homomorphism of the GM encryption scheme. Alice decrypts the ciphertexts and knows , or . We first present Protocol 2 to determine the relationship P(x, y) :  or . If we need to further determine or , we use Protocol 3 to solve the comparison problem. If the result is , we can use Protocol 3 to determine or . Correctness and security: In Protocol 2 and Protocol 3, Step 5 is based on the XOR homomorphism of the GM encryption scheme, that is, If , then , so in Protocol 2 or in Protocol 3; If , then , so in Protocol 2 or in Protocol 3; Because the GM encryption scheme is a probabilistic encryption scheme, the same plaintext can be encrypted to different ciphertexts . Therefore, Bob does not discover the law of ; Alice’s random numbers and Bob’s random number are private. Bob cannot compute , and Alice cannot compute ; Bob selects the ciphertext , and encrypts , so Alice does not know which element Bob selects; The prime numbers p and q are private, so Bob cannot decrypt E(X).

Theorem 2

Protocol 2 is private. We will prove it by constructing and such that Formula(1) and (2) hold. works as follows: The inputs are . randomly selects a number such that . uses to simulate the process. constructs the vector . By the GM encryption scheme, encrypts X using different random numbers ; selects a random , and computes ; decrypts . In the protocol, . LetBecause , therefore,Using the same method, we can construct , such that:This completes the proof.

Theorem 3

Protocol 3 is private. The proving process is similar to Theorem 2, so we omit the proof.

Privately solving a comparison problem for rational numbers

In practice, most numbers need to be compared are rational numbers. The above protocols cannot compare rational numbers, so we propose a solution to compare rational numbers. By “Privately computing the area of a triangle” section, we use two rational numbers m and n to construct three vertices of a triangle, and privately compute the sign of the area to determine , or in one execution. Alice and Bob agree on selecting a number as their abscissa. Alice constructs a point , and Bob constructs a point . Bob selects another point . and form a triangle. They invoke Protocol 1 to compute the sign of , and judge whether on the top of or not. The result tells them , or , as follows in Fig. 1.
Fig. 1

Correctness and security: In the protocol, Alice knows and . If are integers and , Alice can compute r by . But in Protocol 4, are rational numbers, thus Alice cannot compute r by . In the protocol, Alice can get , but there are three equations with four unknown variants and Alice cannot obtain . In step 6, Alice just computes , and she knows the sign of . Thus she knows is clockwise or counterclockwise, but she does not know whether is on the left or right of , so she cannot know or (Fig. 2). Alice knows the sign of is negative, and further knows is clockwise. But she does not know or .
Fig. 2

Example ()

By the result, Bob just obtains , but cannot compute and m. For Alice, the protocol is secure. The protocol does not use any public key encryption scheme, so it is information-theoretical secure. Example ()

Theorem 4

Protocol 4 is private. The conclusion is proved by showing two simulators and such that Formulas (1) and (2) hold. In view of and the slope selects two points from any line with the slope k (Fig. 3), a random number , and computes .
Fig. 3

Selecting

Selecting Note that in the protocol. Let . Since and are arbitrary points on the plane, they are computationally indistinguishable. The results obtained by applying deterministic computation to computationally indistinguishable objects are still computationally indistinguishable. Therefore, and are computationally indistinguishable.Now, we construct . In view of and selects a point (Fig. 4) and simulates as follows:
Fig. 4

Selecting

Selecting 1. computes2. computes3. Bob knows the sign of , that is, . Since and are two arbitrary points that satisfythe two points are computationally indistinguishable. Note that in the protocolLetBy the way, we choose , and it must hold that . Therefore, and are computationally indistinguishable. It follows thatThis completes the proof.

Complexity analysis

In the work, we compare the computational and communication complexity with previous solutions for secure computation of the comparison problem.

Communication complexity

A protocol’s communication cost is usually measured in round. Yao’s protocol (Yao 1982) solves the GT problem with two rounds, but cannot determine whether or . Cachin (1999) proposes a GT protocol depending on a trusted third party, and its communication cost is three rounds. Fischlin (2001) uses the GM encryption scheme to solve or with two-round communication cost. Ioannidis and Grama (2003) uses the scheme to solve the GT problem, and its communication cost is d rounds, where d is the length of the private inputs. Blake and Kolesnikov (2004) uses the Paillier encryption scheme to solve or , and its communication cost is two rounds. Lin’s protocol (Lin and Tzeng 2005) needs two-round communications based on the Elgamal encryption scheme. Grigoriev and Shpilrain (2014) propose a solution to Yao’s Millionaires’ problem based on a public encryption scheme and their communication cost is two rounds. Maitra et al. (2015) propose a unified approach to Millionaires Problem with rational players, and the solution needs two-round communications. In our Protocol 2, we need one round to determine or . If we further determine or , we also need one round communication by Protocol 3. Therefore, for the integer comparison problem, we need two-round communication cost at most. In our Protocol 4, we determine or in one execution, so the communication cost is one round.

Computational complexity

We use the number of modular multiplication to measure the computation costs of a protocol. The computation cost of Yao’s protocol (Yao 1982) is exponential, and it is impractical if inputs are very long. Fischlin (2001) uses the GM encryption scheme to compare integers with () modular multiplications (d is the length of inputs, is set to 40–50). Blake and Kolesnikov (2004) uses the Paillier encryption scheme to solve the GT problem, the computation cost is modular multiplications. Lin and Tzeng (2005) uses () modular multiplications (p is the modulus in the ElGamal encryption scheme) to determine or . Grigoriev and Shpilrain (2014) use a public encryption scheme to solve the Millionaires’ Problem and the computation cost is modular multiplications. Maitra et al. (2015) solve the Millionaires’ problem with modular multiplications. In Protocol 2 and Protocol 3, we use the GM encryption scheme to encrypt the 0–1 encoding vector. The computation cost of the GM encryption scheme is three modular multiplications. So encrypting the vector needs 3L (L is the length of the 0–1 encoding vector) modular multiplications and decrypting needs two modular multiplications. Therefore, the computation cost of Protocol 2 and Protocol 3 is () modular multiplications at most. In Protocol 4, we do not use any public key encryption scheme, so we just needs five additions and eight multiplications. It is well known that simple operations can even be neglected compared with expensive public key encryption or decryption operations. In this sense, our new solution is much more efficient than the existing ones. We compare our protocols with previous solutions in Table 1.
Table 1

Performance comparison

ProtocolThird partyResultData typeRoundComputation
Yao (1982)No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>, \le$$\end{document}>, Integer2Exponential
Cachin (1999)Yes \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>, =,<$$\end{document}>,=,< Integer3
Fischlin (2001)No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>, \le$$\end{document}>, Integer2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\lambda d \text {log} N +6d\lambda +3d$$\end{document}λdlogN+6dλ+3d
Ioannidis and Grama (2003)No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ge ,<$$\end{document},< Integerd
Blake and Kolesnikov (2004)No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>,<$$\end{document}>,< Integer2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$4d\text {log}N$$\end{document}4dlogN
Lin and Tzeng (2005)No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>, \le$$\end{document}>, Integer2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$5d \text {log}p+4d-6$$\end{document}5dlogp+4d-6
Grigoriev and Shpilrain (2014)No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>, \le$$\end{document}>, Integer2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$6\text {log}p+3d$$\end{document}6logp+3d
Maitra et al. (2015)No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>, \le$$\end{document}>, Integer2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2d\text {log}p$$\end{document}2dlogp
Protocols 2, 3No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>, =,<$$\end{document}>,=,< Integer2 \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$6L+4$$\end{document}6L+4
Protocol 4No \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$>, =,<$$\end{document}>,=,< Rational number1Negligible

d is the length of inputs, is set to 40–50 in the Fischlin’s method (Fischlin 2001), p is the modulus in the ElGamal encryption scheme (ElGamal 1984), N is the modulo, L is the length of the 0–1 encoding vector in out work

Performance comparison d is the length of inputs, is set to 40–50 in the Fischlin’s method (Fischlin 2001), p is the modulus in the ElGamal encryption scheme (ElGamal 1984), N is the modulo, L is the length of the 0–1 encoding vector in out work Table 1 shows that our protocols have the following advantages: Our protocols can determine whether or , in one execution; Our protocols can compare rational numbers in addition to integers; Our protocols are more efficient than most of previous solutions in computational complexity.

Conclusion

Solving a comparison problem privately is fundamental to SMC protocols, so the comparison problem needs to be computed more efficiently. In this paper, we propose protocols to compare integers and rational numbers privately. In Protocol 2 and Protocol 3, we construct a 0–1-vector encoding method to encode an integer into a vector, and use the GM encryption scheme to complete the protocol. In Protocol 4, we use the method of computing the area of a triangle to privately compare rational numbers by computing the sign of the area of a triangle. In comparison with previous solutions, our protocols are more efficient and easy to implement. The comparison problem is a building block of SMC problems. If we can solve the problem efficiently, we will solve sorting problems and voting problems efficiently. Next we will solve geometric intersection problems and other SMC problems.
  2 in total

1.  Incremental learning for ν-Support Vector Regression.

Authors:  Bin Gu; Victor S Sheng; Zhijie Wang; Derek Ho; Said Osman; Shuo Li
Journal:  Neural Netw       Date:  2015-04-06

2.  High efficient key-insulated attribute based encryption scheme without bilinear pairing operations.

Authors:  Hanshu Hong; Zhixin Sun
Journal:  Springerplus       Date:  2016-02-19
  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.