skip to main content
10.1145/1281100.1281155acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Practical private computation of vector addition-based functions

Published: 12 August 2007 Publication History

Abstract

In this paper we explore private computation built on vector addition which is a surprisingly general tool for implementing many useful analysis on user-provided data. Examples include both linear and non-linear algorithms such as singular value decomposition (SVD), regression, analysis of variance (ANOVA), and several machine learning algorithms based on Expectation Maximization (EM). The non-linear algorithms aggregate user data only in certain steps, such as conjugate gradient, which are linear in per-user data. We introduce a new and highly efficient VSS (Verifiable Secret-Sharing) protocol in a special but widely-applicable model that allows secret-shared arithmetic operations in such aggregation steps to be done over small fields (e.g. 32 or 64 bits), so that private arithmetic operations have the same cost as normal arithmetic. Verification of user data is required to prevent a malicious user from biasing the computation. We provide a random projection method for verification that uses a linear number of inexpensive small field operations, and only a logarithmic number of large-field (1024 bits or more) cryptographic operations. Our implementation shows that the approach can achieve orders of magnitude reduction in running time over standard techniques (from hours to seconds) for large scale problems (e.g. at the scale where the number of values per user is 106).

References

[1]
J. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy, pages 45--57, Oakland, CA, May 2002.
[2]
J. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR '02, pages 2382--45. ACM Press, 2002.
[3]
J. Canny. Gap: a factor model for discrete data. In SIGIR '04, pages 122--129. ACM Press, 2004.
[4]
R. Cramer and I. Damgård. Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free? In CRYPTO '98. Springer-Verlag, 1998.
[5]
Y. Duan, J. Wang, M. Kam, and J. Canny. A secure online algorithm for link analysis on weighted graph. In Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM Data Mining Conference, 2005, pages 71--81.
[6]
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In STOC '87, pages 218--229, 1987.
[7]
J. M. Kleinberg. Authoritative sources in a hyperlinked environment. Journal of the ACM, 46(5):604--632, 1999.
[8]
A. C.-C. Yao. Protocols for secure computations. In FOCS '82, pages 160--164. IEEE, 1982.

Cited By

View all
  • (2015)Privacy preserving smart grid Communications by verifiable secret key sharing2015 International Conference on Computing and Network Communications (CoCoNet)10.1109/CoCoNet.2015.7411187(199-204)Online publication date: Dec-2015
  • (2013)A Distributed Privacy-Aware Architecture for Communication in Smart Grids2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing10.1109/HPCC.and.EUC.2013.228(1622-1627)Online publication date: Nov-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PODC '07: Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
August 2007
424 pages
ISBN:9781595936165
DOI:10.1145/1281100
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 August 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. L2-norm
  2. private computation
  3. vector addition
  4. zero-knowledge protocol

Qualifiers

  • Article

Conference

PODC07

Acceptance Rates

Overall Acceptance Rate 740 of 2,477 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Privacy preserving smart grid Communications by verifiable secret key sharing2015 International Conference on Computing and Network Communications (CoCoNet)10.1109/CoCoNet.2015.7411187(199-204)Online publication date: Dec-2015
  • (2013)A Distributed Privacy-Aware Architecture for Communication in Smart Grids2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing10.1109/HPCC.and.EUC.2013.228(1622-1627)Online publication date: Nov-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media