scispace - formally typeset
Open Access

Privacy-preserving distributed information sharing

TLDR
This thesis explores techniques for privacy-preserving distributed information sharing that are efficient, secure, and applicable to many situations, and proposes efficient techniques for Privacy-Preserving operations on multisets.
Abstract
In many important applications, a collection of mutually distrustful parties must share information, without compromising their privacy. Currently, these applications are often performed by using some form of a trusted third party (TTP); this TTP receives all players' inputs, computes the desired function, and returns the result. However, the level of trust that must be placed in such a TTP is often inadvisable, undesirable, or even illegal. In order to make many applications practical and secure, we must remove the TTP, replacing it with efficient protocols for privacy-preserving distributed information sharing. Thus, in this thesis we explore techniques for privacy-preserving distributed information sharing that are efficient, secure, and applicable to many situations. As an example of privacy-preserving information sharing, we propose efficient techniques for privacy-preserving operations on multisets. By building a framework of multiset operations, employing the mathematical properties of polynomials, we design efficient, secure, and composable methods to enable privacy-preserving computation of the union, intersection, and element reduction operations. We apply these techniques to a wide range of practical problems, including the Set-Intersection, Over-Threshold Set-Union, Cardinality Set-Intersection, and Threshold Set-Union problems. Additionally, we address the problem of determining Subset relations, and even use our techniques to evaluate CNF boolean formulae. We then examine the problem of hot item identification and publication, a problem closely related to Over-Threshold Set-Union. Many applications of this problem require greater efficiency and robustness than any previously-designed secure protocols for this problem. In order to achieve sufficiently efficient protocols for these problems, we define two new privacy properties: owner privacy and data privacy. Protocols that achieve these properties protect the privacy of each player's personal input set, as well as protecting information about the players' collective inputs. By designing our protocols to achieve owner and data privacy, we are able to significantly increase efficiency over our privacy-preserving set operations, while still protecting the privacy of participants. In addition, our protocols are extremely flexible - nodes can join and leave at any time.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Efficient multi-keyword ranked query over encrypted data in cloud computing

TL;DR: This paper proposes a flexible multi-keyword query scheme, called MKQE, which greatly reduces the maintenance overhead during the keyword dictionary expansion and takes keyword weights and user access history into consideration when generating the query result.
Proceedings ArticleDOI

Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud

TL;DR: A novel approach to address the problem of effective yet secure ranked multi-keyword search over encrypted cloud data, called MKQE, is proposed, which introduces new trapdoor generation and scoring algorithms to make in-order query results.
Journal Article

Round-optimal secure two-party computation

TL;DR: This work considers the central cryptographic task of secure two-party computation: two parties wish to compute some function of their private inputs (each receiving possibly different outputs) where security should hold with respect to arbitrarily-malicious behavior of either of the participants.
Dissertation

Privacy Preserving Reputation Systems for Decentralized Environments

TL;DR: Wang et al. as mentioned in this paper proposed privacy-preserving reputation protocols, which compute reputation such that the individual feedback of any user is not revealed, and use trust awareness, data perturbation, secret sharing, secure multi-party computation, additive homomorphic cryptosystems, and zero-knowledge proofs.
Proceedings Article

Private keyword-based push and pull with applications to anonymous communication: Extended abstract

TL;DR: In this paper, a new keyword-based private information retrieval (PIR) model is proposed, which allows private modification of the database from which information is requested and oblivious access control oblivious to the database servers.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book ChapterDOI

Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems

TL;DR: Pastry as mentioned in this paper is a scalable, distributed object location and routing substrate for wide-area peer-to-peer ap- plications, which performs application-level routing and object location in a po- tentially very large overlay network of nodes connected via the Internet.
Journal ArticleDOI

Space/time trade-offs in hash coding with allowable errors

TL;DR: Analysis of the paradigm problem demonstrates that allowing a small number of test messages to be falsely identified as members of the given set will permit a much smaller hash area to be used without increasing reject time.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Proceedings ArticleDOI

A scalable content-addressable network

TL;DR: The concept of a Content-Addressable Network (CAN) as a distributed infrastructure that provides hash table-like functionality on Internet-like scales is introduced and its scalability, robustness and low-latency properties are demonstrated through simulation.
Related Papers (5)