On the security of a privacy-preserving product calculation scheme

Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi

Research output: Contribution to journalReview article

Abstract

Recently, Jung and Li [1] propose a highly efficient privacy-preserving product calculation scheme without requiring secure communication channels. Then, they present secure approaches to solve several application problems using the product calculation protocol. In this work, we observe several security flawsin their privacy-preserving product calculation scheme and some applicationprotocols. We show the security vulnerabilities will result in the disclosure ofprivate data. In two application protocols, almost all the private numbers will be revealed. We further suggest solutions to fix the security problems.

Original languageEnglish
Article number6871359
Pages (from-to)373-374
Number of pages2
JournalIEEE Transactions on Dependable and Secure Computing
Volume12
Issue number3
DOIs
Publication statusPublished - May 1 2015

Fingerprint

Secure communication

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

On the security of a privacy-preserving product calculation scheme. / Zhu, Youwen; Huang, Zhiqiu; Huang, Liusheng; Takagi, Tsuyoshi.

In: IEEE Transactions on Dependable and Secure Computing, Vol. 12, No. 3, 6871359, 01.05.2015, p. 373-374.

Research output: Contribution to journalReview article

Zhu, Youwen ; Huang, Zhiqiu ; Huang, Liusheng ; Takagi, Tsuyoshi. / On the security of a privacy-preserving product calculation scheme. In: IEEE Transactions on Dependable and Secure Computing. 2015 ; Vol. 12, No. 3. pp. 373-374.
@article{3bd3a5f44dc54912a3cf1701beb30215,
title = "On the security of a privacy-preserving product calculation scheme",
abstract = "Recently, Jung and Li [1] propose a highly efficient privacy-preserving product calculation scheme without requiring secure communication channels. Then, they present secure approaches to solve several application problems using the product calculation protocol. In this work, we observe several security flawsin their privacy-preserving product calculation scheme and some applicationprotocols. We show the security vulnerabilities will result in the disclosure ofprivate data. In two application protocols, almost all the private numbers will be revealed. We further suggest solutions to fix the security problems.",
author = "Youwen Zhu and Zhiqiu Huang and Liusheng Huang and Tsuyoshi Takagi",
year = "2015",
month = "5",
day = "1",
doi = "10.1109/TDSC.2014.2345404",
language = "English",
volume = "12",
pages = "373--374",
journal = "IEEE Transactions on Dependable and Secure Computing",
issn = "1545-5971",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "3",

}

TY - JOUR

T1 - On the security of a privacy-preserving product calculation scheme

AU - Zhu, Youwen

AU - Huang, Zhiqiu

AU - Huang, Liusheng

AU - Takagi, Tsuyoshi

PY - 2015/5/1

Y1 - 2015/5/1

N2 - Recently, Jung and Li [1] propose a highly efficient privacy-preserving product calculation scheme without requiring secure communication channels. Then, they present secure approaches to solve several application problems using the product calculation protocol. In this work, we observe several security flawsin their privacy-preserving product calculation scheme and some applicationprotocols. We show the security vulnerabilities will result in the disclosure ofprivate data. In two application protocols, almost all the private numbers will be revealed. We further suggest solutions to fix the security problems.

AB - Recently, Jung and Li [1] propose a highly efficient privacy-preserving product calculation scheme without requiring secure communication channels. Then, they present secure approaches to solve several application problems using the product calculation protocol. In this work, we observe several security flawsin their privacy-preserving product calculation scheme and some applicationprotocols. We show the security vulnerabilities will result in the disclosure ofprivate data. In two application protocols, almost all the private numbers will be revealed. We further suggest solutions to fix the security problems.

UR - http://www.scopus.com/inward/record.url?scp=84929336066&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84929336066&partnerID=8YFLogxK

U2 - 10.1109/TDSC.2014.2345404

DO - 10.1109/TDSC.2014.2345404

M3 - Review article

VL - 12

SP - 373

EP - 374

JO - IEEE Transactions on Dependable and Secure Computing

JF - IEEE Transactions on Dependable and Secure Computing

SN - 1545-5971

IS - 3

M1 - 6871359

ER -