Privacy-Preserving planarity testing of distributed graphs

被引:0
|
作者
Barshap, Guy [1 ,2 ]
Tassa, Tamir [1 ]
机构
[1] The Open University of Israel, Israel
[2] Ben Gurion University of the Negev, Israel
来源
Transactions on Data Privacy | 2019年 / 12卷 / 02期
关键词
Computation theory - Privacy-preserving techniques;
D O I
暂无
中图分类号
学科分类号
摘要
We study the problem of privacy-preserving planarity testing of distributed graphs. The setting involves several parties that hold private graphs on the same set of vertices, and an external mediator that helps with performing the computations. Their goal is to test whether the union of their private graphs is planar, but in doing so each party wishes to deny from his peers any information on his own private edge set beyond what is implied by the final output of the computation. We present a privacy-preserving protocol for that purpose which is based on the Hanani-Tutte theorem. That theorem enables translating the planarity question into the question of whether a specific system of linear equations over the field F2 is solvable. Our protocol uses a diverse cryptographic toolkit which includes techniques such as homomorphic encryption, oblivious Gaussian elimination, and private set intersection. © 2019, University of Skovde. All rights reserved.
引用
收藏
页码:117 / 144
相关论文
共 50 条
  • [1] Privacy-Preserving Planarity Testing of Distributed Graphs
    Barshap, Guy
    Tassa, Tamir
    [J]. TRANSACTIONS ON DATA PRIVACY, 2019, 12 (02) : 117 - 144
  • [2] Privacy-Preserving Planarity Testing of Distributed Graphs
    Barshap, Guy
    Tassa, Tamir
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 131 - 147
  • [3] Privacy-preserving Triangle Counting in Distributed Graphs
    Do, Hoang Giang
    Ng, Wee Keong
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 917 - 924
  • [4] Privacy-preserving distributed clustering
    Erkin, Zekeriya
    Veugen, Thijs
    Toft, Tomas
    Lagendijk, Reginald L.
    [J]. EURASIP JOURNAL ON INFORMATION SECURITY, 2013, (01):
  • [5] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    [J]. International Journal of Information Security, 2013, 12 : 467 - 494
  • [6] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494
  • [7] Distributed privacy-preserving policy reconciliation
    Meyer, Ulrike
    Wetzel, Susanne
    Ioannidis, Sotiris
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1342 - +
  • [8] Privacy-preserving distributed collaborative filtering
    Boutet, Antoine
    Frey, Davide
    Guerraoui, Rachid
    Jegou, Arnaud
    Kermarrec, Anne-Marie
    [J]. COMPUTING, 2016, 98 (08) : 827 - 846
  • [9] Towards Distributed Privacy-Preserving Prediction
    Lyu, Lingjuan
    Law, Yee Wei
    Ng, Kee Siong
    Xue, Shibei
    Zhao, Jun
    Yang, Mengmeng
    Liu, Lei
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2020, : 4179 - 4184
  • [10] Privacy-preserving distributed collaborative filtering
    Antoine Boutet
    Davide Frey
    Rachid Guerraoui
    Arnaud Jégou
    Anne-Marie Kermarrec
    [J]. Computing, 2016, 98 : 827 - 846