scispace - formally typeset
Open AccessBook ChapterDOI

Privacy-preserving set operations

Reads0
Chats0
TLDR
By building a framework of multiset operations, employing the mathematical properties of polynomials, this work designs efficient, secure, and composable methods to enable privacy-preserving computation of the union, intersection, and element reduction operations.
Abstract
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party's input to the function is his private input multiset. In order to protect these private sets, the players perform privacy-preserving computation; that is, no party learns more information about other parties' private input sets than what can be deduced from the result. In this paper, we propose efficient techniques for privacy-preserving operations on multisets. By building a framework of multiset operations, employing the mathematical properties of polynomials, we design efficient, secure, and composable methods to enable privacy-preserving computation of the union, intersection, and element reduction operations. We apply these techniques to a wide range of practical problems, achieving more efficient results than those of previous work.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

Data Mining: The Textbook

TL;DR: This textbook explores the different aspects of data mining from the fundamentals to the complex data types and their applications, capturing the wide diversity of problem domains for data mining issues.
Journal ArticleDOI

Secure Multiparty Computation for Privacy-Preserving Data Mining

TL;DR: In this article, the basic paradigms and notions of secure mul-tiparty computation and their relevance to the field of privacy-preserving data mining are surveyed and discussed, as well as the relationship between secure multiparty computations and privacy preserving data mining.
Book ChapterDOI

Practical private set intersection protocols with linear complexity

TL;DR: This paper explores some PSI variations and constructs several secure protocols that are appreciably more efficient than the state-of-the-art.
Proceedings Article

Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?

TL;DR: This paper develops three classes of protocols targeted to different set sizes and domains, all based on Yao's generic garbled-circuit method, and compares the performance of these protocols to the fastest custom PSI protocols in the literature.
Proceedings Article

Location Privacy via Private Proximity Testing.

TL;DR: This work describes several secure protocols that support private proximity testing at various levels of granularity and studies the use of “location tags” generated from the physical environment in order to strengthen the security of proximity testing.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Proceedings ArticleDOI

Protocols for secure computations

TL;DR: This paper describes three ways of solving the millionaires’ problem by use of one-way functions (i.e., functions which are easy to evaluate but hard to invert) and discusses the complexity question “How many bits need to be exchanged for the computation”.
Journal ArticleDOI

H = w