A Multiparty Commutative Hashing Protocol based on the Discrete Logarithm Problem (2311.17498v1)
Abstract: Let $\mathcal{X}$ and $\mathcal{Y}$ be two sets and suppose that a set of participants $P={P_1,P_2,\dots,P_n}$ would like to calculate the keyed hash value of some message $m\in\mathcal{X}$ known to a single participant in $P$ called the data owner. Also, suppose that each participant $P_i$ knows a secret value $x_i\in\mathcal{X}$. In this paper, we will propose a protocol that enables the participants in this setup to calculate the value $y=H(m,x_1,x_2,\dots ,x_n)$ of a hash function $H:\mathcal{X}{n+1}\rightarrow\mathcal{Y}$ such that the function $H$ is a one-way function, participants in $P\backslash{P_i}$ cannot obtain $x_i$, participants other than the data owner cannot obtain $m$, and the hash value $y=H(m,x_1,x_2,\dots ,x_n)$ remains the same regardless the order of the secret $x_i$ values.
- W. Diffie, M. E. Hellman. ”New Directions in Cryptography. IEEE Transactions on Information Theory. 22 (6): 644–654 (1976).
- T. ElGamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. 31 (4): 469–472. (1985.)
- Marques JF, Bernardino J. Analysis of Data Anonymization Techniques. InKEOD 2020 (pp. 235-241).
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation). OJ L 119/1 (2016).