Communication-efficient private distance calculation based on oblivious transfer extensions

被引:1
作者
Kaghazgaran, Parisa [1 ]
Takabi, Hassan [2 ]
Currin, Flannery Hope [3 ]
Soriano, Armando [3 ]
机构
[1] Texas A&M Univ, Comp Sci & Engn, College Stn, TX 77843 USA
[2] Univ North Texas, Comp Sci & Engn, Denton, TX 76203 USA
[3] Univ North Texas, Denton, TX 76203 USA
关键词
Private identification; Oblivious transfer; Distance-based similarity; Efficiency; Communication complexity;
D O I
10.1016/j.cose.2019.01.010
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a general framework for computing privacy-preserving distance metrics (PPDM) in the two-party setting in order to improve communication complexity by benefiting from 1-out-of-n oblivious transfers. We implement privacy-preserving Euclidean distance, Cosine similarity and Edit distance protocols while the PPDM framework is easily extendable to address other distance measures. These protocols have direct applications in privacy-preserving one-to-many biometric identification in which two parties known as the client and the server want to find the best match between their inputs. The client's input is compared to all the records in the server's database. We use the semi-honest adversary threat model. We extensively evaluate our PPDM framework. And, we theoretically show the improvement of PPDM over related work. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页码:93 / 105
页数:13
相关论文
共 36 条
  • [1] Recent Advances in Homomorphic Encryption
    Aguilar-Melchor, Carlos
    Fau, Simon
    Fontaine, Caroline
    Gogniat, Guy
    Sirdey, Renaud
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (02) : 108 - 117
  • [2] ALAZIZ MM, 2017, BMC MED GENOMICS, V10
  • [3] [Anonymous], 1987, P 19 ANN ACM STOC 87
  • [4] [Anonymous], 2013, CCS 2013, DOI DOI 10.1145/2508859.2516738
  • [5] [Anonymous], 2016, P AMIA ANN FALL S 89
  • [6] [Anonymous], 2014, P ACM INF HID MULT S
  • [7] [Anonymous], P 12 ACM WORKSH MULT
  • [8] ATALLAH M., 2004, P 2004 ACM WORKSH PR, P103, DOI DOI 10.1145/1029179.1029204
  • [9] Bai YW, 2014, CAN CON EL COMP EN
  • [10] Barker Elaine., 2012, Recommendation for key management - part 1: General (rev 3)