Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining

被引:4
|
作者
Guo, Guanglai [1 ]
Zhu, Yan [1 ]
Chen, E. [1 ]
Yu, Ruyun [2 ]
Zhang, Lejun [3 ]
Lv, Kewei [4 ,5 ]
Feng, Rongquan [6 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Cyberspace Secur Co Ltd, China Elect Technol Res Inst, Beijing 10085, Peoples R China
[3] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou 510006, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[5] Chinese Acad Sci, Inst Informat Engn, Beijing 100193, Peoples R China
[6] Peking Univ, Sch Math Sci, Beijing 100871, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Protocols; Reliability; Privacy; Homomorphic encryption; Distributed databases; Computational modeling; Error detection; homomorphic encryption (HE); multisource data mining; privacy preservation; reliability; secure multiparty computation; ASSOCIATION RULES;
D O I
10.1109/TR.2023.3246563
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, we address the problem of data privacy in multisource data mining. To do it, we present a new multiparty fully homomorphic encryption (MP-FHE) scheme, in which all participants are completely fair to perform the same computation. At first, the proposed MP-FHE scheme is divided into five stages (i.e., calculation, configuration, recombination, resharing, and reconstruction stage) to achieve the unified computation form of addition and multiplication. Meanwhile, random bivariate polynomials and commutative encryption are used to achieve the degree reduction of polynomials and the continuity of computation. Moreover, we prove that the scheme meets result consistency and program termination under the fail-stop adversary model. Especially, three kinds of error detection criteria are presented to find errors in three different stages (i.e., recombination, resharing, and reconstruction stage), which provides the monitor basis for the fail-stop adversary model. In addition, the MP-FHE scheme is applied into privacy preserving k-means clustering algorithm. Finally, we evaluate the computation and communication performance of our scheme from both theoretical and experimental aspects, and the evaluation results show that the scheme is efficient enough for multisource data mining.
引用
收藏
页码:1308 / 1323
页数:16
相关论文
共 50 条
  • [21] Lightweight and Efficient Privacy-Preserving Multimodal Representation Inference via Fully Homomorphic Encryption
    Li, Zhaojue
    Sang, Yingpeng
    Deng, Xinru
    Tian, Hui
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2023, PT I, 2023, 13995 : 307 - 321
  • [22] Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption
    Liu, Chengjin
    Zoe L Jiang
    Zhao, Xin
    Chen, Qian
    Fang, Junbin
    He, Daojing
    Zhang, Jun
    Wang, Xuan
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [23] Privacy-preserving association rule mining via multi-key fully homomorphic encryption
    Jia, Peiheng
    Zhang, Jie
    Zhao, Bowen
    Li, Hongtao
    Liu, Ximeng
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (02) : 641 - 650
  • [24] Privacy-preserving approximate GWAS computation based on homomorphic encryption
    Duhyeong Kim
    Yongha Son
    Dongwoo Kim
    Andrey Kim
    Seungwan Hong
    Jung Hee Cheon
    BMC Medical Genomics, 13
  • [25] Privacy-Preserving Collaborative Filtering Using Fully Homomorphic Encryption
    Jumonji, Seiya
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    2022 IEEE 38TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2022), 2022, : 1551 - 1552
  • [26] Privacy-preserving iris authentication using fully homomorphic encryption
    Mahesh Kumar Morampudi
    Munaga V. N. K. Prasad
    U. S. N. Raju
    Multimedia Tools and Applications, 2020, 79 : 19215 - 19237
  • [27] Privacy-Preserving Collaborative Filtering Using Fully Homomorphic Encryption
    Jumonji, Seiya
    Sakai, Kazuya
    Sun, Min-Te
    Ku, Wei-Shinn
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2023, 35 (03) : 2961 - 2974
  • [28] Privacy-Preserving Minority Oversampling Protocols with Fully Homomorphic Encryption
    Sun, Maohua
    Yang, Ruidi
    Liu, Mengying
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [29] Privacy-preserving iris authentication using fully homomorphic encryption
    Morampudi, Mahesh Kumar
    Prasad, Munaga V. N. K.
    Raju, U. S. N.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (27-28) : 19215 - 19237
  • [30] Privacy-preserving approximate GWAS computation based on homomorphic encryption
    Kim, Duhyeong
    Son, Yongha
    Kim, Dongwoo
    Kim, Andrey
    Hong, Seungwan
    Cheon, Jung Hee
    BMC MEDICAL GENOMICS, 2020, 13 (Suppl 7)