Secure Computation of the Median (and Other Elements of Specified Ranks)

被引:18
|
作者
Aggarwal, Gagan [1 ]
Mishra, Nina [2 ]
Pinkas, Benny [3 ]
机构
[1] Google Res, Mountain View, CA USA
[2] Microsoft Res, Search Labs, Mountain View, CA USA
[3] Univ Haifa, Dept Comp Sci, IL-31999 Haifa, Israel
基金
以色列科学基金会;
关键词
Secure function evaluation; Secure multi-party computation; kth-ranked element; Median; Semi-honest adversary; Malicious adversary;
D O I
10.1007/s00145-010-9059-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the problem of securely computing the kth-ranked element of the union of two or more large, confidential data sets. This is a fundamental question motivated by many practical contexts. For example, two competitive companies may wish to compute the median salary of their combined employee populations without revealing to each other the exact salaries of their employees. While protocols do exist for computing the kth-ranked element, they require time that is at least linear in the sum of the sizes of their combined inputs. This paper investigates two-party and multi-party protocols for both the semi-honest and malicious cases. In the two-party setting, we prove that the problem can be solved in a number of rounds that is logarithmic in k, where each round requires communication and computation cost that is linear in b, the number of bits needed to describe each element of the input data. In the multi-party setting, we prove that the number of rounds is linear in b, where each round has overhead proportional to b multiplied by the number of parties. The multi-party protocol can be used in the two-party case. The overhead introduced by our protocols closely match the communication complexity lower bound. Our protocols can handle a malicious adversary via simple consistency checks.
引用
收藏
页码:373 / 401
页数:29
相关论文
共 50 条
  • [31] Efficient computation of generalized median estimators
    Sarah L. Wilde
    Scott D. Grimshaw
    Computational Statistics, 2013, 28 : 307 - 317
  • [32] Dynamic computation of generalised median strings
    Jiang, XY
    Abegglen, K
    Bunke, H
    Csirik, J
    PATTERN ANALYSIS AND APPLICATIONS, 2003, 6 (03) : 185 - 193
  • [33] Geometry of Covariance Matrices and Computation of Median
    Yang, Le
    Arnaudon, Marc
    Barbaresco, Frederic
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2010, 1305 : 479 - +
  • [34] Median graph computation for graph clustering
    Adel Hlaoui
    Shengrui Wang
    Soft Computing, 2006, 10 : 47 - 53
  • [35] EFFICIENT COMPUTATION OF AN ISOTONIC MEDIAN REGRESSION
    PARDALOS, PM
    XUE, GL
    YONG, L
    APPLIED MATHEMATICS LETTERS, 1995, 8 (02) : 67 - 70
  • [36] Dynamic computation of generalised median strings
    X. Jiang
    K. Abegglen
    H. Bunke
    Janos Csirik
    Pattern Analysis & Applications, 2003, 6 : 185 - 193
  • [37] EVOKED-RESPONSES BY MEDIAN COMPUTATION
    NOGAWA, T
    KATAYAMA, K
    TABATA, Y
    OHSHIO, T
    KAWAHARA, T
    ELECTROENCEPHALOGRAPHY AND CLINICAL NEUROPHYSIOLOGY, 1981, 52 (03): : S31 - S31
  • [38] ADDITION OF SPECIFIED ELEMENTS TO LIQUID COUNTERS
    COLGATE, SA
    REVIEW OF SCIENTIFIC INSTRUMENTS, 1951, 22 (05): : 346 - 346
  • [39] Efficient computation of generalized median estimators
    Wilde, Sarah L.
    Grimshaw, Scott D.
    COMPUTATIONAL STATISTICS, 2013, 28 (01) : 307 - 317
  • [40] A Stochastic Approach to Median String Computation
    Olivares-Rodriguez, Cristian
    Oncina, Jose
    STRUCTURAL, SYNTACTIC, AND STATISTICAL PATTERN RECOGNITION, 2008, 5342 : 431 - 440