Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel

被引:78
|
作者
Jung, Taeho [1 ]
Li, Xiang-Yang [1 ]
Wan, Meng [2 ]
机构
[1] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[2] Minist Educ, Ctr Sci & Technol Dev, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; data aggregation; secure channels; SMC; homomorphic; BOOLEAN FUNCTIONS; DATA AGGREGATION; POLYNOMIAL FORM;
D O I
10.1109/TDSC.2014.2309134
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity. In this paper, we consider how an external aggregator or multiple parties can learn some algebraic statistics (e.g., sum, product) over participants' privately owned data while preserving the data privacy. We assume all channels are subject to eavesdropping attacks, and all the communications throughout the aggregation are open to others. We first propose several protocols that successfully guarantee data privacy under semi-honest model, and then present advanced protocols which tolerate up to k passive adversaries who do not try to tamper the computation. Under this weak assumption, we limit both the communication and computation complexity of each participant to a small constant. At the end, we present applications which solve several interesting problems via our protocols.
引用
收藏
页码:45 / 57
页数:13
相关论文
共 50 条
  • [31] SeDiCom: A Secure Distributed Privacy-Preserving Communication Platform
    Marsalek, Alexander
    Pruenster, Bernd
    Suzic, Bojan
    Zefferer, Thomas
    INFORMATION SYSTEMS SECURITY, ICISS 2018, 2018, 11281 : 345 - 363
  • [32] PrivacyFL: A Simulator for Privacy-Preserving and Secure Federated Learning
    Mugunthan, Vaikkunth
    Peraire-Bueno, Anton
    Kagal, Lalana
    CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, : 3085 - 3092
  • [34] GSTS: A secure and privacy-preserving protocol for vehicular communications
    Lin, Xiaodong
    Sun, Xiaoting
    Ho, Pin-Han
    Shen, Xuemin
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2007, 56 (06) : 3442 - 3456
  • [35] PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data
    Kotal, Anantaa
    Piplai, Aritran
    Chukkapalli, Sai Sree Laya
    Joshi, Anupam
    PROCEEDINGS OF THE 2022 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA '22), 2022, : 35 - 45
  • [36] Towards Privacy-Preserving and Secure Opportunistic Routings in VANETs
    Zhang, Lei
    Song, Jun
    Pan, Jianping
    2014 ELEVENTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2014, : 627 - 635
  • [37] GENERATIVE AI FOR SECURE AND PRIVACY-PRESERVING MOBILE CROWDSENSING
    Yang, Yaoqi
    Zhang, Bangning
    Guo, Daoxing
    Du, Hongyang
    Xiong, Zehui
    Niyato, Dusit
    Han, Zhu
    IEEE WIRELESS COMMUNICATIONS, 2024, 31 (06) : 29 - 38
  • [38] Secure and privacy-preserving information aggregation for smart grids
    Li F.
    Luo B.
    Liu P.
    International Journal of Security and Networks, 2011, 6 (01) : 28 - 39
  • [39] STDP: Secure Privacy-Preserving Trajectory Data Publishing
    Eom, Chris Soo-Hyun
    Lee, Wookey
    Leung, Carson Kai-Sang
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 892 - 899
  • [40] Collusion-resistant, Lightweight and Privacy-preserving Authentication Protocol for IoV
    Lalouani, Wassila
    Younis, Mohamed
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,