Communication-Efficient and Privacy-Preserving Protocol for Computing Over-Threshold Set-Union

被引:0
作者
Gong, Xuhui
Hua, Qiang-sheng [1 ]
Jin, Hai
机构
[1] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Sch Comp Sci & Technol, Serv Comp Technol, Wuhan 430074, Peoples R China
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PT I | 2020年 / 12384卷
基金
中国国家自然科学基金;
关键词
Over-threshold set-union; Data aggregation; Secure multi-party computation; Privacy;
D O I
10.1007/978-3-030-59016-1_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a variety of applications, the data items of multiple participants are collected and analyzed, and meanwhile the participants' privacy needs to be protected. This paper studies an over-threshold data aggregation problem, i.e., over-threshold set-union. In our model, we assume there are n participants, an untrusted data aggregator and a proxy, and each participant has a sensitive data item. The over-threshold set-union is normally defined as follows: given a threshold t, the aggregator only learns the data items which appear at least t times in the union of data items of all participants without learning anything else. Existing solutions either suffer from high communication cost or leak the multiplicity information of data items. In order to handle this defect, we present an efficient protocol in the honest-but-curious model by leveraging threshold secret sharing and dual pairing vector spaces. We prove that the proposed protocol not only has O(n log(2) n) communication complexity which nearly matches the lower bound Omega(n/ log n) but also protects the data privacy.
引用
收藏
页码:121 / 133
页数:13
相关论文
共 21 条
[1]   Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions [J].
Abe, Masayuki ;
Nishimaki, Ryo ;
Chase, Melissa ;
David, Bernardo ;
Kohlweiss, Markulf ;
Ohkubo, Miyako .
JOURNAL OF CRYPTOLOGY, 2016, 29 (04) :833-878
[2]  
[Anonymous], 2010, P 19 INT C COMPUTER
[3]  
Applebaum B, 2010, LECT NOTES COMPUT SC, V6205, P56, DOI 10.1007/978-3-642-14527-8_4
[4]   Function-Hiding Inner Product Encryption [J].
Bishop, Allison ;
Jain, Abhishek ;
Kowalczyk, Lucas .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :470-491
[5]   Trading Private Range Counting over Big IoT Data [J].
Cai, Zhipeng ;
He, Zaobo .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :144-153
[6]   A Differential-Private Framework for Urban Traffic Flows Estimation via Taxi Companies [J].
Cai, Zhipeng ;
Zheng, Xu ;
Yu, Jiguo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) :6492-6499
[7]   A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems [J].
Cai, Zhipeng ;
Zheng, Xu .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (02) :766-775
[8]   Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J].
Castelluccia, Claude ;
Chan, Aldar C-F ;
Mykletun, Einar ;
Tsudik, Gene .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2009, 5 (03) :1-36
[9]   Privacy-preserving range set union for rare cases in healthcare data [J].
Chun, J. Y. ;
Lee, D. H. ;
Jeong, I. R. .
IET COMMUNICATIONS, 2012, 6 (18) :3288-3293
[10]   Secure distributed key generation for discrete-log based cryptosystems [J].
Gennaro, Rosario ;
Jarecki, Stanislaw ;
Krawczyk, Hugo ;
Rabin, Tal .
JOURNAL OF CRYPTOLOGY, 2007, 20 (01) :51-83