Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel

被引:78
|
作者
Jung, Taeho [1 ]
Li, Xiang-Yang [1 ]
Wan, Meng [2 ]
机构
[1] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[2] Minist Educ, Ctr Sci & Technol Dev, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; data aggregation; secure channels; SMC; homomorphic; BOOLEAN FUNCTIONS; DATA AGGREGATION; POLYNOMIAL FORM;
D O I
10.1109/TDSC.2014.2309134
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity. In this paper, we consider how an external aggregator or multiple parties can learn some algebraic statistics (e.g., sum, product) over participants' privately owned data while preserving the data privacy. We assume all channels are subject to eavesdropping attacks, and all the communications throughout the aggregation are open to others. We first propose several protocols that successfully guarantee data privacy under semi-honest model, and then present advanced protocols which tolerate up to k passive adversaries who do not try to tamper the computation. Under this weak assumption, we limit both the communication and computation complexity of each participant to a small constant. At the end, we present applications which solve several interesting problems via our protocols.
引用
收藏
页码:45 / 57
页数:13
相关论文
共 50 条
  • [21] Privacy-Preserving Gross Domestic Product (GDP) Calculation Using Paillier Encryption and Differential Privacy
    Pillai, Sanjaikanth E. Vadakkethil Somanathan
    Hu, Wen-Chen
    PROCEEDINGS OF THE 2024 ACM SOUTHEAST CONFERENCE, ACMSE 2024, 2024, : 182 - 187
  • [22] Secure and Privacy-preserving Traffic Monitoring in VANETs
    Roy, Ayan
    Madria, Sanjay
    2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), 2020, : 567 - 575
  • [23] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Leyou Zhang
    Qing Wu
    Yi Mu
    Jingxia Zhang
    Journal of Medical Systems, 2016, 40
  • [24] Privacy-Preserving and Secure Sharing of PHR in the Cloud
    Zhang, Leyou
    Wu, Qing
    Mu, Yi
    Zhang, Jingxia
    JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (12)
  • [25] An anti-collusion solution for privacy-preserving data mining
    Li, Zhe-peng
    Wang, Wei-ping
    Chen, Wen-hui
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 351 - +
  • [26] Learning Privacy-Preserving Channel Charts
    Agostini, Patrick
    Utkovski, Zoran
    Bjelakovic, Igor
    Stanczak, Slawomir
    FIFTY-SEVENTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, IEEECONF, 2023, : 1654 - 1660
  • [27] Privacy-Preserving Distributed Algorithm for Sparse Vector Sum
    Zhong, Sheng
    BULLETIN OF THE BELGIAN MATHEMATICAL SOCIETY-SIMON STEVIN, 2010, 17 (02) : 235 - 242
  • [28] Privacy-Preserving Outsourced Calculation Toolkit in the Cloud
    Liu, Ximeng
    Deng, Robert H.
    Choo, Kim-Kwang Raymond
    Yang, Yang
    Pang, HweeHwa
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 898 - 911
  • [29] CAE: Collusion Attack Emulator for Privacy-preserving Data Aggregation Schemes
    Yang, Wei
    Huang, Liusheng
    Lu, Xiaorong
    Shen, Yao
    2016 13TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2016, : 127 - 135
  • [30] Secure and Distributed Assessment of Privacy-Preserving GWAS Releases
    Pascoal, Tulio
    Decouchant, Jeremie
    Volp, Marcus
    PROCEEDINGS OF THE TWENTY-THIRD ACM/IFIP INTERNATIONAL MIDDLEWARE CONFERENCE, MIDDLEWARE 2022, 2022, : 308 - 321