Collusion-Tolerable Privacy-Preserving Sum and Product Calculation without Secure Channel

被引:78
|
作者
Jung, Taeho [1 ]
Li, Xiang-Yang [1 ]
Wan, Meng [2 ]
机构
[1] IIT, Dept Comp Sci, Chicago, IL 60616 USA
[2] Minist Educ, Ctr Sci & Technol Dev, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; data aggregation; secure channels; SMC; homomorphic; BOOLEAN FUNCTIONS; DATA AGGREGATION; POLYNOMIAL FORM;
D O I
10.1109/TDSC.2014.2309134
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Much research has been conducted to securely outsource multiple parties' data aggregation to an untrusted aggregator without disclosing each individual's privately owned data, or to enable multiple parties to jointly aggregate their data while preserving privacy. However, those works either require secure pair-wise communication channels or suffer from high complexity. In this paper, we consider how an external aggregator or multiple parties can learn some algebraic statistics (e.g., sum, product) over participants' privately owned data while preserving the data privacy. We assume all channels are subject to eavesdropping attacks, and all the communications throughout the aggregation are open to others. We first propose several protocols that successfully guarantee data privacy under semi-honest model, and then present advanced protocols which tolerate up to k passive adversaries who do not try to tamper the computation. Under this weak assumption, we limit both the communication and computation complexity of each participant to a small constant. At the end, we present applications which solve several interesting problems via our protocols.
引用
收藏
页码:45 / 57
页数:13
相关论文
共 50 条
  • [41] A Verifiable Privacy-Preserving Federated Learning Framework Against Collusion Attacks
    Chen, Yange
    He, Suyu
    Wang, Baocang
    Feng, Zhanshen
    Zhu, Guanghui
    Tian, Zhihong
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2025, 24 (05) : 3918 - 3934
  • [42] Privacy-Preserving and Secure Divide-and-Conquer Learning
    Brown, Lewis C. L.
    Li, Qinghua
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 510 - 515
  • [43] A Review of Secure and Privacy-Preserving Medical Data Sharing
    Jin, Hao
    Luo, Yan
    Li, Peilong
    Mathew, Jomol
    IEEE ACCESS, 2019, 7 : 61656 - 61669
  • [44] Efficient and Secure Protocols for Privacy-Preserving Set Operations
    Sang, Yingpeng
    Shen, Hong
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
  • [45] Smart Contracts for a Secure and Privacy-Preserving Smart Grid
    Ferre-Queralt, Joan
    Castella-Roca, Jordi
    Viejo, Alexandre
    RISKS AND SECURITY OF INTERNET AND SYSTEMS, CRISIS 2023, 2023, 14529 : 103 - 118
  • [46] Privacy-preserving secure relative localization in vehicular networks
    Tang, Lei
    Hong, Xiaoyan
    Bradford, Phillip G.
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (03) : 195 - 204
  • [47] PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications
    Put, Andreas
    Dacosta, Italo
    Milutinovic, Milica
    De Decker, Bart
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 403 - 416
  • [48] A new secure arrangement for privacy-preserving data collection
    Song, Jingcheng
    Han, Zhaoyang
    Wang, Weizheng
    Chen, Jingxue
    Liu, Yining
    COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [49] Fast Secure Aggregation for Privacy-Preserving Federated Learning
    Liu, Yanjun
    Qian, Xinyuan
    Li, Hongwei
    Hao, Meng
    Guo, Song
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3017 - 3022
  • [50] Privacy-Preserving Photo Sharing based on a Secure JPEG
    Yuan, Lin
    Korshunov, Pavel
    Ebrahimi, Touradj
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2015, : 185 - 190