Efficient Privacy Preserving Reputation Protocols Inspired by Secure Sum

被引:1
|
作者
Hasan, Omar [1 ]
Bertino, Elisa [2 ]
Brunie, Lionel [1 ]
机构
[1] INSA Lyon, Lyon, France
[2] Purdue Univ, W Lafayette, IN 47907 USA
关键词
D O I
10.1109/PST.2010.5593245
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secure sum protocol is a well-known protocol for computing the sum of private inputs from distributed entities such that the inputs remain private. In this paper we present protocols for computing reputation in a privacy preserving manner that are inspired by the secure sum protocol. We provide a protocol that is secure under the semi-honest adversarial model as well as one that is secure under the stronger non-disruptive malicious model. Although the protocols are inspired by secure sum, they do not suffer from the issues that plague secure sum. Our protocols are resilient against colluding entities, which secure sum is not. The protocols that we develop are also efficient. We require an exchange of O(n) messages under the semi-honest model, where n is the number of feedback providers in the protocol. This is the same complexity offered by secure sum. Our protocol for the non-disruptive malicious model exchanges O(N log n) messages, where N is the number of entities in the system.
引用
收藏
页码:126 / 133
页数:8
相关论文
共 50 条
  • [1] Efficient and Secure Protocols for Privacy-Preserving Set Operations
    Sang, Yingpeng
    Shen, Hong
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
  • [2] Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols
    David, Bernardo
    Dowsley, Rafael
    Katti, Raj
    Nascimento, Anderson C. A.
    [J]. PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 354 - 367
  • [3] Efficient Privacy Preserving Protocols for Similarity Join
    Hawashin, Bilal
    Fotouhi, Farshad
    Truta, Traian Marius
    Grosky, William
    [J]. TRANSACTIONS ON DATA PRIVACY, 2012, 5 (01) : 297 - 330
  • [4] Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments
    Zhu, Youwen
    Takagi, Tsuyoshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01): : 409 - 412
  • [5] A Secure and Efficient Framework for Privacy Preserving Social Recommendation
    Liu, Shushu
    Liu, An
    Liu, Guanfeng
    Li, Zhixu
    Xu, Jiajie
    Zhao, Pengpeng
    Zhao, Lei
    [J]. WEB TECHNOLOGIES AND APPLICATIONS (APWEB 2015), 2015, 9313 : 781 - 792
  • [6] Secure Multi-party Protocols for Privacy Preserving Data Mining
    Ma, Qingkai
    Deng, Ping
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 526 - 537
  • [7] A survey on privacy-preserving authentication protocols for secure vehicular communication
    Sutradhar, Kartick
    Pillai, Beena G.
    Amin, Ruhul
    Narayan, Dayanand Lal
    [J]. COMPUTER COMMUNICATIONS, 2024, 219 : 1 - 18
  • [8] A Survey of Secure Multiparty Computation Protocols for Privacy Preserving Genetic Tests
    Dugan, Tamara
    Zou, Xukai
    [J]. 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2016, : 173 - 182
  • [9] Privacy-preserving authentication protocols with efficient verification in VANETs
    Zhang, Jianhong
    Xu, Yuwei
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (12) : 3676 - 3692
  • [10] Efficient Protocols for privacy preserving matching against distributed datasets
    Sang, Yingpeng
    Shen, Hong
    Tan, Yasuo
    Xiong, Naixue
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 210 - +