Towards Efficient Privacy-Preserving Multi-Party Multi-Data Sorting

被引:0
|
作者
Shang, Shuai [1 ]
Li, Xiong [1 ,2 ,3 ]
Zhang, Wen-Qi [1 ]
Wang, Xiao-Fen [1 ]
Li, Zhe-Tao [4 ,5 ,6 ]
Zhang, Xiao-Song [1 ,3 ]
机构
[1] College of Computer Science and Engineering(College of Cyber Security), University of Electronic Science and Technology of China, Chengdu,611731, China
[2] Key Laboratory of Data Protection and Intelligent Management, Ministry of Education, Sichuan University, Chengdu,610065, China
[3] Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Guangdong, Shenzhen,518110, China
[4] National & Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Jinan University, Guangzhou,510632, China
[5] Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Jinan University, Guangzhou,510632, China
[6] College of Information Science and Technology, Jinan University, Guangzhou,510632, China
来源
基金
中国国家自然科学基金;
关键词
Data privacy - Differential privacy - Polynomial approximation;
D O I
10.11897/SP.J.1016.2024.01832
中图分类号
学科分类号
摘要
In recent years, secure multi-party computation has received extensive attention in academia and industry. Secure multi-party computation allows multiple participants with private inputs to jointly compute a multi-input function without revealing any information about the private inputs of each participant,which makes the data available but invisible. As a fundamental problem in secure multi-party computation, privacy-preserving sorting allows multiple participants to compute the joint sorting result of multiple datasets without disclosing the privacy of the datasets and the sorting result,which has a wide range of application needs and values,such as product pricing, auctions, interest recommendations. Most of the existing privacy-preserving sorting protocols only support two participants,and cannot meet the joint sorting requirements of multiple participants in practical scenarios. The existing multi-party multi-data sorting protocols have the problems of high communication overhead,high computational complexity. As a result,they all suffer low overall efficiency. At the same time, the existing privacy-preserving sorting protocols do not consider the malicious security model of exhaustive attacks by malicious participants, and only realize security under the semi-honest adversary model, thus providing insufficient security protection against the more realistic malicious adversary model. In this paper,we propose an efficient privacy-preserving multi-party multi-data sorting protocol to overcome the above problems. Through this protocol,multiple participants can collectively compute the sorting results of their data in a privacy-preserving way with only O(1) rounds of interaction. Specifically, this paper designs a polynomial-based encoding method that encodes a participant′s dataset as a polynomial. In such a polynomial,the exponent and coefficient represent the data and the number of the data,respectively. Therefore,the sorting of multiple participant datasets can be realized by polynomial addition. For the above polynomial-based encoding algorithms,this paper also proposes polynomial encryption, aggregate polynomial generation, and decryption polynomial generation algorithms to realize the privacy protection of the encoded polynomials of each dataset based on the guarantee of computational correctness. The above algorithms can ensure the security of the encoded polynomials at the cost of low computational and communication overheads. Finally, each participant obtains the sorting result in a privacy-preserving way by means of communication-efficient oblivious transfer. In this paper,we consider a more realistic security model,provide for the first time the definition of malicious security under the non-colluding participant exhaustive attack, and define ideal functionalities of privacy-preserving sorting in different security models. The security analysis shows that the proposed protocol not only achieves semi-honest security, but also achieves malicious security against the exhaustive attack of non-colluding malicious users. In addition, a large number of experiments show that the proposed protocol is very efficient in both communication and computation. For example,when the number of participants is 15,each participant holds 20 000 data,and the upper bound of data is 500 000, our protocol’s communication and computation overheads are 898. 44 MB and 69. 76 s, which are only 12. 08% and 76. 85% of that of the LDYW protocol. Compared with the AHM+ scheme,our protocol’s computational efficiency is improved by about 20 times with only 4 times increase in the communication overhead. © 2024 Science Press. All rights reserved.
引用
收藏
页码:1832 / 1852
相关论文
共 50 条
  • [21] Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis
    Hao, Wanjun
    Liu, Shuqin
    Lv, Chunyang
    Wang, Yunling
    Wang, Jianfeng
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (08)
  • [22] Privacy preserving clustering for multi-party
    Yang, Weijia
    Huang, Shangteng
    [J]. ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 213 - +
  • [23] Privacy-preserving SVM classification on horizontally partitioned data with secure multi-party computation
    Hu, Yunhong
    Fang, Liang
    He, Guoping
    [J]. Journal of Information and Computational Science, 2009, 6 (06): : 2341 - 2348
  • [24] Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation
    Chen, Huajie
    Uenal, Ali Burak
    Akguen, Mete
    Pfeifer, Nico
    [J]. PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 61 - 69
  • [25] Multi-party, privacy-preserving distributed data mining using a game theoretic framework
    Kargupta, Hillol
    Das, Kamalika
    Liu, Kun
    [J]. KNOWLEDGE DISCOVERY IN DATABASES: PKDD 2007, PROCEEDINGS, 2007, 4702 : 523 - +
  • [26] Scalable Multi-Round Multi-Party Privacy-Preserving Neural Network Training
    Lu, Xingyu
    Basaran, Umit Yigit
    Guler, Basak
    [J]. IEEE Transactions on Information Theory, 2024, 70 (11) : 8204 - 8236
  • [27] Incremental clustering techniques for multi-party Privacy-Preserving Record Linkage
    Vatsalan, Dinusha
    Christen, Peter
    Rahm, Erhard
    [J]. DATA & KNOWLEDGE ENGINEERING, 2020, 128 (128)
  • [28] Private Blocking Technique for Multi-party Privacy-Preserving Record Linkage
    Han S.
    Shen D.
    Nie T.
    Kou Y.
    Yu G.
    [J]. Data Science and Engineering, 2017, 2 (2) : 187 - 196
  • [29] Privacy-preserving quantum multi-party computation based on circular structure
    Deng, Zhiliang
    Zhang, Ying
    Zhang, Xiaorui
    Li, Lingling
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 120 - 124
  • [30] Outsourced Privacy-Preserving Anomaly Detection in Time Series of Multi-Party
    Chunkai Zhang
    Wei Zuo
    Peng Yang
    Ye Li
    Xuan Wang
    [J]. China Communications, 2022, 19 (02) : 201 - 213