Secure computation protocol of Chebyshev distance under the malicious model
Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. Especially within electronic archival management systems, secure computation of Chebyshev distance is employed...
Saved in:
Main Authors: | Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Portfolio
2024-07-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-024-67907-9 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secure Biometric Verification in the Presence of Malicious Adversaries
by: Kamela Al-Mannai, et al.
Published: (2025-01-01) -
Behaviour Analysis of Mobile Malicious Software in Network
by: Xuetao Du, et al.
Published: (2015-08-01) -
Malicious attack-resistant secure localization algorithm for wireless sensor network
by: Kun XU, et al.
Published: (2016-12-01) -
Design method of secure computing protocol for deep neural network
by: Renwan BI, et al.
Published: (2020-08-01) -
Overview of detection techniques for malicious social bots
by: Rong LIU, et al.
Published: (2017-11-01)