Abstract
Linear regression is a basic statistical method to correlate two or more attributes in data mining, machine learning, decision tree and Bayes classification. This paper studies non-black-box two-party computation of linear regression protocols with malicious adversaries. The contribution of this paper comprises the following three-fold:
-
in the first fold, a general two-party computation model for linear regression protocols is introduced and formalized;
-
in the second fold, a non-black-box two-party computation of linear regression protocols based on the Goldreich, Micali and Wigderson’s compiler technique is presented;
-
in the third fold, we show that the proposed non-black-box construction tolerates malicious adversaries in the simulation-based framework assuming that the underlying Damgård and Jurik’s public key encryption scheme is semantically secure and the Damgård-Fujisaki commitment scheme is statistically hiding and computationally binding.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Asokan, N., Schunter, M., Waidner, M.: Optimistic protocols for fair exchange. In: ACM Conference on Computer and Communications Security, pp. 7–17 (1997)
Asokan, N., Shoup, V., Waidner, M.: Asynchronous protocols for optimistic fair exchange. In: IEEE Symposium on Security and Privacy, pp. 86–99. IEEE Computer Society, Los Alamitos (1998)
Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures (extended abstract). In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 591–606. Springer, Heidelberg (1998)
Clifton, C.W.: Opportunities for private and secure machine learning. In: Balfanz, D., Staddon, J. (eds.) AISec, pp. 31–32. ACM, New York (2008)
Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 125–142. Springer, Heidelberg (2002)
Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier’s probabilistic public-key system. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119–136. Springer, Heidelberg (2001)
Damgård, I., Jurik, M.: Client/Server tradeoffs for online elections. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 125–140. Springer, Heidelberg (2002)
Franklin, M.K., Mohassel, P.: Efficient and secure evaluation of multivariate polynomials and applications. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 236–254. Springer, Heidelberg (2010)
Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218–229. ACM, New York (1987)
Han, S., Ng, W.K., Wan, L., Lee, V.C.S.: Privacy-preserving gradient-descent methods. IEEE Trans. Knowl. Data Eng. 22(6), 884–899 (2010)
Huang, Z., Du, W.: Optrr: Optimizing randomized response schemes for privacy-preserving data mining. In: ICDE, pp. 705–714. IEEE, Los Alamitos (2008)
Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Özcan, F. (ed.) SIGMOD Conference, pp. 37–48. ACM, New York (2005)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Vaidya, J., Clifton, C., Kantarcioglu, M., Patterson, A.S.: Privacy-preserving decision trees over vertically partitioned data. TKDD 2(3) (2008)
Vaidya, J., Kantarcioglu, M., Clifton, C.: Privacy-preserving naïve bayes classification. VLDB J. 17(4), 879–898 (2008)
Wan, L., Ng, W.K., Han, S., Lee, V.C.S.: Privacy-preservation for gradient descent methods. In: Berkhin, P., Caruana, R., Wu, X. (eds.) KDD, pp. 775–783. ACM, New York (2007)
Zhu, H.: Constructing committed signatures from strong-RSA assumption in the standard complexity model. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 101–114. Springer, Heidelberg (2004)
Zhu, H., Bao, F.: Stand-alone and setup-free verifiably committed signatures. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 159–173. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhu, H. (2011). Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries. In: Bao, F., Weng, J. (eds) Information Security Practice and Experience. ISPEC 2011. Lecture Notes in Computer Science, vol 6672. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21031-0_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-21031-0_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21030-3
Online ISBN: 978-3-642-21031-0
eBook Packages: Computer ScienceComputer Science (R0)