Skip to main content

Efficient Secure Primitive for Privacy Preserving Distributed Computations

  • Conference paper
Advances in Information and Computer Security (IWSEC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7631))

Included in the following conference series:

Abstract

Scalar product protocol aims at securely computing the dot product of two private vectors. As a basic tool, the protocol has been widely used in privacy preserving distributed collaborative computations. In this paper, at the expense of disclosing partial sum of some private data, we propose a linearly efficient Even-Dimension Scalar Product Protocol (EDSPP) without employing expensive homomorphic crypto-system and third party. The correctness and security of EDSPP are confirmed by theoretical analysis. In comparison with six most frequently-used schemes of scalar product protocol (to the best of our knowledge), the new scheme is a much more efficient one, and it has well fairness. Simulated experiment results intuitively indicate the good performance of our novel scheme. Consequently, in the situations where divulging very limited information about private data is acceptable, EDSPP is an extremely competitive candidate secure primitive to achieve practical schemes of privacy preserving distributed cooperative computations. We also present a simple application case of EDSPP.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. HIPAA. The health insurance portability and accountability act of 1996 (October 1998), http://www.ocius.biz/hipaa.html

  2. Cios, K.J., Moore, G.W.: Uniqueness of medical data mining. Artificial Intelligence in Medicine 26(1-2), 1–24 (2002)

    Article  Google Scholar 

  3. Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM Sigmod Record 29, 439–450 (2000)

    Article  Google Scholar 

  4. Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. Journal of Privacy and Confidentiality 1(1), 59–98 (2009)

    Google Scholar 

  5. Yang, B., Nakagawa, H., Sato, I., Sakuma, J.: Collusion-resistant privacy-preserving data mining. In: The 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 483–492 (2010)

    Google Scholar 

  6. Chen, T., Zhong, S.: Privacy-preserving backpropagation neural network learning. IEEE Transactions on Neural Networks 20(10), 1554–1564 (2009)

    Article  Google Scholar 

  7. Bansal, A., Chen, T., Zhong, S.: Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data. Neural Computing and Applications 20(1), 143–150 (2011)

    Article  Google Scholar 

  8. Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacy-preserving similar document detection. The VLDB Journal 19(4), 457–475 (2010)

    Article  Google Scholar 

  9. Xiao, M., Huang, L., Xu, H., Wang, Y., Pei, Z.: Privacy Preserving Hop-distance Computation in Wireless Sensor Networks. Chinese Journal of Electronics 19(1), 191–194 (2010)

    Google Scholar 

  10. Zhu, Y., Huang, L., Dong, L., Yang, W.: Privacy-preserving Text Information Hiding Detecting Algorithm. Journal of Electronics and Information Technology 33(2), 278–283 (2011)

    Article  Google Scholar 

  11. Smaragdis, P., Shashanka, M.: A framework for secure speech recognition. IEEE Transactions on Audio, Speech, and Language Processing 15(4), 1404–1413 (2007)

    Article  Google Scholar 

  12. Du, W., Zhan, Z.: A practical approach to solve secure multi-party computation problems. In: The 2002 Workshop on New Security Paradigms, pp. 127–135. ACM, New York (2002)

    Chapter  Google Scholar 

  13. Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 639–644. ACM, New York (2002)

    Chapter  Google Scholar 

  14. Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On Private Scalar Product Computation for Privacy-Preserving Data Mining. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104–120. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Amirbekyan, A., Estivill-Castro, V.: A new efficient privacy-preserving scalar product protocol. In: The Sixth Australasian Conference on Data Mining and Analytics, vol. 70, pp. 209–214. Australian Computer Society (2007)

    Google Scholar 

  16. Shaneck, M., Kim, Y.: Efficient Cryptographic Primitives for Private Data Mining. In: The 2010 43rd Hawaii International Conference on System Sciences, pp. 1–9. IEEE Computer Society (2010)

    Google Scholar 

  17. Goldreich, O.: Foundations of Cryptography: Volume II, Basic Applications. Cambridge University Press, Cambridge (2004)

    Google Scholar 

  18. Qi, Y., Atallah, M.J.: Efficient privacy-preserving k-nearest neighbor search. In: The 28th International Conference on Distributed Computing Systems (ICDCS 2008), pp. 311–319. IEEE (2008)

    Google Scholar 

  19. Shaneck, M., Kim, Y., Kumar, V.: Privacy preserving nearest neighbor search. In: 6th IEEE International Conference on Data Mining Workshops, pp. 541–545. IEEE (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhu, Y., Takagi, T., Huang, L. (2012). Efficient Secure Primitive for Privacy Preserving Distributed Computations. In: Hanaoka, G., Yamauchi, T. (eds) Advances in Information and Computer Security. IWSEC 2012. Lecture Notes in Computer Science, vol 7631. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34117-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34117-5_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34116-8

  • Online ISBN: 978-3-642-34117-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics