Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union

被引:0
|
作者
Gong, Xuhui
Hua, Qiang-sheng [1 ]
Jin, Hai
机构
[1] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Sch Comp Sci & Technol, Serv Comp Technol, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Over-threshold set-union; Data aggregation; Secure multi-party computation; Privacy;
D O I
10.1007/978-3-030-59016-1_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a variety of applications, the data items of multiple participants are collected and analyzed, and meanwhile the participants' privacy needs to be protected. This paper studies an over-threshold data aggregation problem, i.e., over-threshold set-union. In our model, we assume there are n participants, an untrusted data aggregator and a proxy, and each participant has a sensitive data item. The over-threshold set-union is normally defined as follows: given a threshold t, the aggregator only learns the data items which appear at least t times in the union of data items of all participants without learning anything else. Existing solutions either suffer from high communication cost or leak the multiplicity information of data items. In order to handle this defect, we present an efficient protocol in the honest-but-curious model by leveraging threshold secret sharing and dual pairing vector spaces. We prove that the proposed protocol not only has O(n log(2) n) communication complexity which nearly matches the lower bound Omega(n/ log n) but also protects the data privacy.
引用
收藏
页码:121 / 133
页数:13
相关论文
共 50 条
  • [41] Communication-Efficient Privacy-Preserving Federated Learning via Knowledge Distillation for Human Activity Recognition Systems
    Gad, Gad
    Fadlullah, Zubair Md
    Rabie, Khaled
    Fouda, Mostafa M.
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 1572 - 1578
  • [42] Privacy-preserving statistical computing protocols for private set intersection
    Niu, Ziyu
    Wang, Hao
    Li, Zhi
    Song, Xiangfu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10118 - 10139
  • [43] Efficient privacy-preserving decision tree classification protocol
    Ma L.
    Peng J.
    Pei Q.
    Zhu H.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 80 - 89
  • [44] A new efficient privacy-preserving scalar product protocol
    Amirbekyan, Artak
    Estivill-Castro, Vladimir
    Conferences in Research and Practice in Information Technology Series, 2007, 70 : 209 - 214
  • [45] A Communication-Efficient, Privacy-Preserving Federated Learning Algorithm Based on Two-Stage Gradient Pruning and Differentiated Differential Privacy
    Li, Yong
    Du, Wei
    Han, Liquan
    Zhang, Zhenjian
    Liu, Tongtong
    SENSORS, 2023, 23 (23)
  • [46] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [47] Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1090 - 1103
  • [48] EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Guan, Yunguo
    Zhang, Songnian
    Shao, Jun
    Wang, Fengwei
    Zhu, Hui
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (02) : 524 - 536
  • [49] Privacy-Preserving Statistics Protocol for Set-Based Computation
    Song X.
    Gai M.
    Zhao S.
    Jiang H.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2221 - 2231
  • [50] An Efficient Overlay Infrastructure for Privacy-Preserving Communication on the Internet
    Al-Muhtadi, Jalal
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2007, 19 : 39 - 59