Privacy-preserving disjunctive normal form-operations on distributed sets

被引:16
作者
Chun, Ji Young [1 ]
Hong, Dowon [2 ]
Jeong, Ik Rae [1 ]
Lee, Dong Hoon [1 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, CIST, Seoul 136701, South Korea
[2] Elect & Telecommun Res Inst, Taejon 305700, South Korea
基金
新加坡国家研究基金会;
关键词
Set operation; DNF; Set union; Threshold set intersection; EFFICIENT; INTERSECTION; PROTOCOLS;
D O I
10.1016/j.ins.2011.07.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy-preserving set operations such as set union and set intersection on distributed sets are widely used in data mining in which the preservation of privacy is of the utmost concern. In this paper, we extended privacy-preserving set operations and considered privacy-preserving disjunctive normal form (DNF) operations on distributed sets. A privacy-preserving DNF operation on distributed sets can be used to find a set S-F satisfying S-F = (S-1,S-1 boolean AND ... boolean AND S-1,S-t2) boolean OR ... boolean OR (S-t1,S-1 boolean AND ... boolean AND S-t1,S-t2) without revealing any other information besides just the information which could be inferred from the DNF operations, where S-i,S-j is an element of {A(1), ..., An, (A(1)) over bar, ..., (A(n)) over bar} and set A(k) is known only to a party P-k. A complement set (A(k)) over bar is defined as (A(k)) over bar = (A(1) boolean OR ... boolean OR A(n)) - A(k). Using privacy-preserving DNF operations on distributed sets, it is possible to find set union, (threshold) set intersection, and a set of k-repeated elements. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:113 / 122
页数:10
相关论文
共 26 条
  • [1] Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
  • [2] Secure set union and bag union computation for guaranteeing anonymity of distrustful participants
    Böttcher, Stefan
    Obermeier, Sebastian
    [J]. Journal of Software, 2008, 3 (01) : 9 - 17
  • [3] Camenisch J, 2009, LECT NOTES COMPUT SC, V5628, P108, DOI 10.1007/978-3-642-03549-4_7
  • [4] Dachman-Soled D, 2009, LECT NOTES COMPUT SC, V5536, P125, DOI 10.1007/978-3-642-01957-9_8
  • [5] Desmedt Y, 2000, LECT NOTES COMPUT SC, V1807, P557
  • [6] Freedman MJ, 2004, LECT NOTES COMPUT SC, V3027, P1
  • [7] Frikken K, 2007, LECT NOTES COMPUT SC, V4521, P237
  • [8] Furukawa J., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P368
  • [9] Gentry C., P EUROCRYPT IN PRESS
  • [10] Fully Homomorphic Encryption Using Ideal Lattices
    Gentry, Craig
    [J]. STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, : 169 - 178