SFour: A Protocol for Cryptographically Secure Record Linkage at Scale

被引:4
|
作者
Khurram, Basit [1 ]
Kerschbaum, Florian [1 ]
机构
[1] Univ Waterloo, Waterloo, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Secure Multiparty Computation; Private Record Linkage; Entity Matching; Private Permutation; Deduplication;
D O I
10.1109/ICDE48307.2020.00031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The prevalence of various (and increasingly large) datasets presents the challenging problem of discovering common entities dispersed across disparate datasets. Solutions to the private record linkage problem (PRL) aim to enable such explorations of datasets in a secure manner. A two-party PRL protocol allows two parties to determine for which entities they each possess a record (either an exact matching record or a fuzzy matching record) in their respective datasets without revealing to one another information about any entities for which they do not both possess records. Although several solutions have been proposed to solve the PRL problem, no current solution offers a fully cryptographic security guarantee while maintaining both high accuracy of output and subquadratic runtime efficiency. To this end, we propose the first known efficient PRL protocol that runs in subquadratic time, provides high accuracy, and guarantees cryptographic security in the semi-honest security model.
引用
收藏
页码:277 / 288
页数:12
相关论文
共 50 条
  • [1] Cryptographically Secure Private Record Linkage Using Locality-Sensitive Hashing
    Wei, Ruidi
    Kerschbaum, Florian
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 17 (02): : 79 - 91
  • [2] An efficient key exchange protocol for cryptographically secure CDMA systems
    Shepherd, SJ
    Barton, SK
    Kemp, AH
    [J]. PIMRC '97 - EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS: WAVES OF THE YEAR 2000+, TECHNICAL PROGRAM, PROCEEDINGS, VOLS 1-3, 1997, : 480 - 484
  • [3] Cryptographically Secure Computation
    Shen, Emily
    Varia, Mayank
    Cunningham, Robert K.
    Vesey, W. Konrad
    [J]. COMPUTER, 2015, 48 (04) : 78 - 81
  • [4] Cryptographically Secure Biometrics
    Stoianov, A.
    [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION VII, 2010, 7667
  • [5] Cryptographically Secure Shields
    Cioranesco, Jean-Michel
    Danger, Jean-Luc
    Graba, Tarik
    Guilley, Sylvain
    Mathieu, Yves
    Naccache, David
    Xuan Thuy Ngo
    [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2014, : 25 - 31
  • [6] Composite Bloom Filters for Secure Record Linkage
    Durham, Elizabeth A.
    Kantarcioglu, Murat
    Xue, Yuan
    Toth, Csaba
    Kuzu, Mehmet
    Malin, Bradley
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (12) : 2956 - 2968
  • [7] Cryptographically secure identity certificates
    Kirovski, D
    Jojic, N
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS: DESIGN AND IMPLEMENTATION OF SIGNAL PROCESSING SYSTEMS INDUSTRY TECHNOLOGY TRACKS MACHINE LEARNING FOR SIGNAL PROCESSING MULTIMEDIA SIGNAL PROCESSING SIGNAL PROCESSING FOR EDUCATION, 2004, : 413 - 416
  • [8] Cryptographically Secure Detection of Injection Attacks
    Lu, Yun
    Mitropoulos, Konstantinos
    Ostrovsky, Rafail
    Weinstock, Avraham
    Zikas, Vassilis
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2240 - 2242
  • [9] Cryptographically Secure Bloom-Filters
    Nojima, Ryo
    Kadobayashi, Youki
    [J]. TRANSACTIONS ON DATA PRIVACY, 2009, 2 (02) : 131 - 139
  • [10] On cryptographically secure vectorial Boolean functions
    Satoh, T
    Iwata, T
    Kurosawa, K
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 20 - 28