Author
Listed:
- Xin Liu
(School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou 014010, China
State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China)
- Jianwei Kong
(School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou 014010, China)
- Lu Peng
(Beijing Institute of Computer Technology and Applications, Beijing 100039, China)
- Dan Luo
(Department of Computer Science, Tianjin Renai University, Tianjin 301636, China)
- Gang Xu
(School of Information Science and Technology, North China University of Technology, Beijing 100144, China)
- Xiubo Chen
(State Key Laboratory of Network and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China)
- Xiaomeng Liu
(School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou 014010, China)
Abstract
The secure computation of the graph structure is an important element in the field of secure calculation of graphs, which is important in querying data in graphs, since there are no algorithms for the graph edit distance problem that can resist attacks by malicious adversaries. In this paper, for the problem of secure computation of similarity edit distance of graphs, firstly, the encoding method applicable to the Paillier encryption algorithm is proposed, and the XOR operation scheme is proposed according to the Paillier homomorphic encryption algorithm. Then, the security algorithm under the semi-honest model is designed, which adopts the new encoding method and the XOR operation scheme. Finally, for the malicious behaviors that may be implemented by malicious participants in the semi-honest algorithm, using the hash function, a algorithm for secure computation of graph editing distance under the malicious model is designed, and the security of the algorithm is proved, and the computational complexity and the communication complexity of the algorithm are analyzed, which is more efficient compared with the existing schemes, and has practical value. The algorithm designed in this paper fills the research gap in the existing literature on the problem of graph edit distance and contributes to solving the problem.
Suggested Citation
Xin Liu & Jianwei Kong & Lu Peng & Dan Luo & Gang Xu & Xiubo Chen & Xiaomeng Liu, 2023.
"A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks,"
Mathematics, MDPI, vol. 11(23), pages 1-17, December.
Handle:
RePEc:gam:jmathe:v:11:y:2023:i:23:p:4847-:d:1292666
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:23:p:4847-:d:1292666. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.