Privacy-preserving statistical computing protocols for private set intersection

被引:9
作者
Niu, Ziyu [1 ]
Wang, Hao [1 ,2 ]
Li, Zhi [1 ]
Song, Xiangfu [3 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, 1 Univ Rd, Jinan 250358, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Shandong Univ, Sch Comp Sci & Technol, Jinan, Peoples R China
基金
中国国家自然科学基金;
关键词
privacy‐ preserving; private set intersection; secure multiparty computation; statistical computing; CARDINALITY;
D O I
10.1002/int.22420
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of Internet and the widespread application of distributed computing, people enjoy various conveniences while at the same time their privacy has also been threatened. Secure multiparty computation (MPC) can solve the problem of how data owners who do not trust each other jointly compute in distributed scenarios. Using MPC technique, people can not only realize data joint computing, but also ensure data privacy. In most data application scenarios, private data held by different parties can often be represented by sets. To complete the relevant statistical computations of the intersection of two private sets, we propose a suite of protocols based on MPC. These protocols can compute the statistical functions of the associated data of the intersection, including cardinality, sum, average, variance, range, and so forth, without revealing any additional information other than the result. To achieve these functions, we design a private membership test protocol with the result as the arithmetic sharing value, called the arithmetic shared private membership test (ASPMT) protocol. On the basis of the ASPMT protocol, the size and other statistics of the intersection can be computed securely and efficiently. All fundamental computations are constructed based on secret sharing and oblivious transfer techniques. Thanks to the use of precomputation technique, all protocols are highly efficient.
引用
收藏
页码:10118 / 10139
页数:22
相关论文
共 50 条
  • [21] Research on Privacy-Preserving Technology for Cloud Computing
    Wang, Xiaolong
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 636 - 639
  • [22] PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions
    Ying, Jason H. M.
    Cao, Shuwei
    Sen Poh, Geong
    Xu, Jia
    Lim, Hoon Wei
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2022, 2022, 13269 : 585 - 604
  • [23] Protocol for Privacy-Preserving Set Pattern Matching
    Zheng Qiang
    Luo Shou-shan
    Xin Yang
    Yang Yi-xian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 168 - 172
  • [24] PRIVACY-PRESERVING STATISTICAL ANALYSIS ON HEALTH DATA
    Samet, Saeed
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCES ON E-HEALTH 2015 E-COMMERCE AND DIGITAL MARKETING 2015 AND INFORMATION SYSTEMS POST-IMPLEMENTATION AND CHANGE MANAGEMENT 2015, 2015, : 3 - 9
  • [25] Verifiability for privacy-preserving computing on distributed data — a surveyVerifiability for privacy-preserving computing...T. Bontekoe et al.
    Tariq Bontekoe
    Dimka Karastoyanova
    Fatih Turkmen
    International Journal of Information Security, 2025, 24 (3)
  • [26] PIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants
    Hwang, Seoyeon
    Jarecki, Stanislaw
    Karl, Zane
    van Kempen, Elina
    Tsudik, Gene
    COMPUTER SECURITY-ESORICS 2024, PT III, 2024, 14984 : 362 - 382
  • [27] Survey of Privacy Preserving Oriented Set Intersection Computation
    Wei L.
    Liu J.
    Zhang L.
    Wang Q.
    He C.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1782 - 1799
  • [28] Traceable Private Set Intersection in Cloud Computing
    Jiang, Tao
    Yuan, Xu
    2019 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2019, : 81 - 87
  • [29] Privacy-Preserving Link Prediction in Multiple Private Networks
    Zhang, Hai-Feng
    Ma, Xiao-Jing
    Wang, Jing
    Zhang, Xingyi
    Pan, Donghui
    Zhong, Kai
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 10 (02) : 538 - 550
  • [30] Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 23 - 42