Privacy-preserving statistical computing protocols for private set intersection

被引:8
|
作者
Niu, Ziyu [1 ]
Wang, Hao [1 ,2 ]
Li, Zhi [1 ]
Song, Xiangfu [3 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, 1 Univ Rd, Jinan 250358, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
privacy‐ preserving; private set intersection; secure multiparty computation; statistical computing; CARDINALITY;
D O I
10.1002/int.22420
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of Internet and the widespread application of distributed computing, people enjoy various conveniences while at the same time their privacy has also been threatened. Secure multiparty computation (MPC) can solve the problem of how data owners who do not trust each other jointly compute in distributed scenarios. Using MPC technique, people can not only realize data joint computing, but also ensure data privacy. In most data application scenarios, private data held by different parties can often be represented by sets. To complete the relevant statistical computations of the intersection of two private sets, we propose a suite of protocols based on MPC. These protocols can compute the statistical functions of the associated data of the intersection, including cardinality, sum, average, variance, range, and so forth, without revealing any additional information other than the result. To achieve these functions, we design a private membership test protocol with the result as the arithmetic sharing value, called the arithmetic shared private membership test (ASPMT) protocol. On the basis of the ASPMT protocol, the size and other statistics of the intersection can be computed securely and efficiently. All fundamental computations are constructed based on secret sharing and oblivious transfer techniques. Thanks to the use of precomputation technique, all protocols are highly efficient.
引用
收藏
页码:10118 / 10139
页数:22
相关论文
共 50 条
  • [31] Towards practical privacy-preserving protocols
    Demmler, Daniel
    IT-INFORMATION TECHNOLOGY, 2022, 64 (1-2): : 49 - 53
  • [32] Verifying Indistinguishability of Privacy-Preserving Protocols
    Linvill, Kirby
    Kaki, Gowtham
    Wustrow, Eric
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [33] Protocols for Privacy-Preserving DBSCAN Clustering
    Xu Wei-jiang
    Huang Liu-sheng
    Luo Yong-long
    Yao Yi-fei
    Jing Wei-wei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 45 - 56
  • [34] Privacy-Preserving Authentication Protocols in Vanet
    Nath H.J.
    Choudhury H.
    SN Computer Science, 4 (5)
  • [35] New Realizations of Efficient and Secure Private Set Intersection Protocols Preserving Fairness
    Debnath, Sumit Kumar
    Dutta, Ratna
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2016, 2017, 10157 : 254 - 284
  • [36] Privacy-preserving Judgment of the Intersection for Convex Polygons
    Yao, Yifei
    Ning, Shurong
    Tian, Miaomiao
    Yang, Wei
    JOURNAL OF COMPUTERS, 2012, 7 (09) : 2224 - 2231
  • [37] Privacy-preserving data set union
    Segre, Alberto Maria
    Wildenberg, Andrew
    Vieland, Veronica
    Zhang, Ying
    PRIVACY IN STATISTICAL DATABASES, PROCEEDINGS, 2006, 4302 : 266 - +
  • [38] Privacy-Preserving Fog Computing Paradigm
    Abubaker, Nabil
    Dervishi, Leonard
    Ayday, Erman
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 502 - 509
  • [39] JEDI: Joint and Effective Privacy Preserving Outsourced Set Intersection and Data Integration Protocols
    Chen, Yu-Chi
    Huang, Kuan-Chun
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4504 - 4514
  • [40] Privacy-preserving mixed set operations
    Wang, Wenli
    Li, Shundong
    Dou, Jiawei
    Du, Runmeng
    INFORMATION SCIENCES, 2020, 525 : 67 - 81