Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel

被引:78
|
作者
Jung, Taeho [1 ]
Li, Xiang-Yang [1 ]
Wan, Meng [2 ]
机构
[1] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[2] Minist Educ, Ctr Sci & Technol Dev, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; data aggregation; secure channels; SMC; homomorphic; BOOLEAN FUNCTIONS; DATA AGGREGATION; POLYNOMIAL FORM;
D O I
10.1109/TDSC.2014.2309134
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity. In this paper, we consider how an external aggregator or multiple parties can learn some algebraic statistics (e.g., sum, product) over participants' privately owned data while preserving the data privacy. We assume all channels are subject to eavesdropping attacks, and all the communications throughout the aggregation are open to others. We first propose several protocols that successfully guarantee data privacy under semi-honest model, and then present advanced protocols which tolerate up to k passive adversaries who do not try to tamper the computation. Under this weak assumption, we limit both the communication and computation complexity of each participant to a small constant. At the end, we present applications which solve several interesting problems via our protocols.
引用
收藏
页码:45 / 57
页数:13
相关论文
共 50 条
  • [11] Secure and privacy-preserving, timed vehicular communications
    Burmester, Mike
    Magkos, Emmanouil
    Chrissikopoulos, Vassilis
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2012, 10 (04) : 219 - 229
  • [12] SPCEX: Secure and Privacy-Preserving Cryptocurrency Exchange
    Xie, Haomeng
    Yan, Zheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4404 - 4417
  • [13] Secure and Privacy-Preserving Proxy Voting System
    Zwattendorfer, Bernd
    Hillebold, Christoph
    Teufl, Peter
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 472 - 477
  • [14] Secure and Privacy-Preserving Database Services in the Cloud
    Agrawal, Divyakant
    El Abbadi, Amr
    Wang, Shiyuan
    2013 IEEE 29TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2013, : 1268 - 1271
  • [15] On the Road to Secure and Privacy-Preserving IoT Ecosystems
    Hernandez-Serrano, Juan
    Munoz, Jose L.
    Broering, Arne
    Esparza, Oscar
    Mikkelsen, Lars
    Schwarzott, Wolfgang
    Leon, Olga
    Zibuschka, Jan
    INTEROPERABILITY AND OPEN-SOURCE SOLUTIONS FOR THE INTERNET OF THINGS (INTEROSS-IOT 2016), 2017, 10218 : 107 - 122
  • [16] Secure and Privacy-preserving Querying of Content in MANETs
    El Defrawy, Karim
    Holland, Gavin
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 603 - 608
  • [17] Secure and Privacy-Preserving Identity Management in the Cloud
    Zwattendorfer, Bernd
    Krenn, Stephan
    Loruenser, Thomas
    ERCIM NEWS, 2016, (104): : 44 - +
  • [18] PrivMail: A Privacy-Preserving Framework for Secure Emails
    Chandran, Gowri R.
    Nieminen, Raine
    Schneider, Thomas
    Suresh, Ajith
    COMPUTER SECURITY - ESORICS 2023, PT II, 2024, 14345 : 145 - 165
  • [19] Secure and privacy-preserving structure in opportunistic networks
    Rashidibajgan, Samaneh
    Hupperich, Thomas
    Doss, Robin
    Foerster, Anna
    COMPUTERS & SECURITY, 2021, 104
  • [20] Secure, privacy-preserving analysis of distributed databases
    Karr, Alan F.
    Fulp, William J.
    Vera, Francisco
    Young, S. Stanley
    Lin, Xiaodong
    Reiter, Jerome P.
    TECHNOMETRICS, 2007, 49 (03) : 335 - 345