Nothing Special   »   [go: up one dir, main page]

skip to main content
A study of several specific secure two-party computation problems
Publisher:
  • Purdue University
  • Dept. of Computer Sciences West Lafayette, IN
  • United States
ISBN:978-0-493-57586-5
Order Number:AAI3043719
Pages:
159
Reflects downloads up to 16 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

Alice has a private input x (of any data type, such as a number, a matrix or a data set). Bob has another private input y . Alice and Bob want to cooperatively conduct a specific computation on x and y without disclosing to the other person any information about her or his private input except for what could be derived from the results. This problem is a Secure Two-party Computation (STC) problem, which has been extensively studied in the past. Several generic solutions have been proposed to solve the general STC problem; however the generic solutions are often too inefficient to be practical. Therefore, in this dissertation, we study several specific STC problems with the goal of finding more efficient solutions than the generic ones.

We introduce a number of specific STC problems in the domains of scientific computation, statistical analysis, computational geometry and database query. Most of the problems have not been studied before in the literature.

To solve these problems: (1) We investigate how data perturbation could be used to hide data. Data perturbation hides a datum by adding to it a random number. We show that this technique is effective in preserving privacy. (2) We explore how domain specific knowledge can improve the efficiency of the solutions that we develop over the generic solutions that do not consider domain specific knowledge. We show that such knowledge is important in both hiding data and achieving higher efficiency. (3) We also introduce a number of common building blocks that are useful in solving secure two-party computation problems in various computation domains.

Cited By

  1. Wang Y and Li Y (2015). An efficient and tunable matrix-disguising method toward privacy-preserving computation, Security and Communication Networks, 8:17, (3099-3110), Online publication date: 25-Nov-2015.
  2. Qin J, Duan H, Zhao H and Hu J (2014). A new Lagrange solution to the privacy-preserving general geometric intersection problem, Journal of Network and Computer Applications, 46:C, (94-99), Online publication date: 1-Nov-2014.
  3. Hong Y, Vaidya J, Lu H and Wang L Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 8566, (179-194)
  4. ACM
    Laud P and Pankova A On the (Im)possibility of privately outsourcing linear programming Proceedings of the 2013 ACM workshop on Cloud computing security workshop, (55-64)
  5. Pan X and Meng X (2013). Preserving location privacy without exact locations in mobile services, Frontiers of Computer Science: Selected Publications from Chinese Universities, 7:3, (317-340), Online publication date: 1-Jun-2013.
  6. Hong Y, Vaidya J and Lu H Efficient distributed linear programming with limited disclosure Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy, (170-185)
  7. ACM
    Mohammed N, Fung B, Hung P and Lee C (2010). Centralized and Distributed Anonymization for High-Dimensional Healthcare Data, ACM Transactions on Knowledge Discovery from Data (TKDD), 4:4, (1-33), Online publication date: 1-Oct-2010.
  8. ACM
    Bednarz A, Bean N and Roughan M Hiccups on the road to privacy-preserving linear programming Proceedings of the 8th ACM workshop on Privacy in the electronic society, (117-120)
  9. Wang I, Shen C, Zhan J, Hsu T, Liau C and Wang D (2009). Toward empirical aspects of secure scalar product, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 39:4, (440-447), Online publication date: 1-Jul-2009.
  10. ACM
    Vaidya J Privacy-preserving linear programming Proceedings of the 2009 ACM symposium on Applied Computing, (2002-2007)
  11. ACM
    Yao D, Frikken K, Atallah M and Tamassia R (2008). Private Information, ACM Transactions on Information and System Security (TISSEC), 12:1, (1-27), Online publication date: 1-Oct-2008.
  12. ACM
    Machanavajjhala A, Kifer D, Gehrke J and Venkitasubramaniam M (2007). L-diversity, ACM Transactions on Knowledge Discovery from Data, 1:1, (3-es), Online publication date: 1-Mar-2007.
  13. Kiltz E, Leander G and Malone-Lee J Secure computation of the mean and related statistics Proceedings of the Second international conference on Theory of Cryptography, (283-302)
  14. Sehgal S and Pal A Finding pareto-optimal set of distributed vectors with minimum disclosure Proceedings of the 6th international conference on Distributed Computing, (144-149)
  15. ACM
    Luo W and Li X A study of secure multi-party elementary function computation protocols Proceedings of the 3rd international conference on Information security, (5-12)
  16. ACM
    Atallah M, Bykova M, Li J, Frikken K and Topkara M Private collaborative forecasting and benchmarking Proceedings of the 2004 ACM workshop on Privacy in the electronic society, (103-114)
  17. ACM
    Frikken K and Atallah M Privacy preserving route planning Proceedings of the 2004 ACM workshop on Privacy in the electronic society, (8-15)
  18. Du W and Zhan Z Building decision tree classifier on private data Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14, (1-8)
  19. ACM
    Du W and Zhan Z A practical approach to solve Secure Multi-party Computation problems Proceedings of the 2002 workshop on New security paradigms, (127-135)
Contributors
  • Syracuse University
  • Purdue University
  • Purdue University
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations