Privacy-Preserving Planarity Testing of Distributed Graphs

被引:0
作者
Barshap, Guy [1 ,2 ]
Tassa, Tamir [1 ]
机构
[1] Open Univ Israel, Tel Aviv, Israel
[2] Ben Gurion Univ Negev, Beer Sheva, Israel
关键词
secure multiparty computation; privacy-preserving distributed computations; distributed graphs; graph planarity; ASSOCIATION RULES; ALGORITHMS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the problem of privacy-preserving planarity testing of distributed graphs. The setting involves several parties that hold private graphs on the same set of vertices, and an external mediator that helps with performing the computations. Their goal is to test whether the union of their private graphs is planar, but in doing so each party wishes to deny from his peers any information on his own private edge set beyond what is implied by the final output of the computation. We present a privacy-preserving protocol for that purpose which is based on the Hanani-Tutte theorem. That theorem enables translating the planarity question into the question of whether a specific system of linear equations over the field F-2 is solvable. Our protocol uses a diverse cryptographic toolkit which includes techniques such as homomorphic encryption, oblivious Gaussian elimination, and private set intersection.
引用
收藏
页码:117 / 144
页数:28
相关论文
共 45 条
[1]  
Alwen J, 2008, LECT NOTES COMPUT SC, V5157, P497, DOI 10.1007/978-3-540-85174-5_28
[2]  
Aly A., 2013, Financial Cryptography, P239
[3]   Secure Centrality Computation Over Multiple Networks [J].
Asharov, Gilad ;
Bonchi, Francesco ;
Garcia Soriano, David ;
Tassa, Tamir .
PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17), 2017, :957-966
[4]   A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation [J].
Asharov, Gilad ;
Lindell, Yehuda .
JOURNAL OF CRYPTOLOGY, 2017, 30 (01) :58-151
[5]  
AWERBUCH B, 1987, IEEE T COMPUT, V36, P1258, DOI 10.1109/TC.1987.1676869
[6]   Privacy-Preserving Planarity Testing of Distributed Graphs [J].
Barshap, Guy ;
Tassa, Tamir .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 :131-147
[7]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[8]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[9]  
Boyer John M, 2004, J GRAPH ALGORITHMS A, V8, P241, DOI DOI 10.7155/jgaa.00091
[10]  
Brickell J, 2005, LECT NOTES COMPUT SC, V3788, P236