Towards Efficient Privacy-Preserving Multi-Party Multi-Data Sorting

被引:0
|
作者
Shang, Shuai [1 ]
Li, Xiong [1 ,2 ,3 ]
Zhang, Wen-Qi [1 ]
Wang, Xiao-Fen [1 ]
Li, Zhe-Tao [4 ,5 ,6 ]
Zhang, Xiao-Song [1 ,3 ]
机构
[1] College of Computer Science and Engineering(College of Cyber Security), University of Electronic Science and Technology of China, Chengdu,611731, China
[2] Key Laboratory of Data Protection and Intelligent Management, Ministry of Education, Sichuan University, Chengdu,610065, China
[3] Shenzhen Institute for Advanced Study, University of Electronic Science and Technology of China, Guangdong, Shenzhen,518110, China
[4] National & Local Joint Engineering Research Center of Network Security Detection and Protection Technology, Jinan University, Guangzhou,510632, China
[5] Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Jinan University, Guangzhou,510632, China
[6] College of Information Science and Technology, Jinan University, Guangzhou,510632, China
来源
基金
中国国家自然科学基金;
关键词
Data privacy - Differential privacy - Polynomial approximation;
D O I
10.11897/SP.J.1016.2024.01832
中图分类号
学科分类号
摘要
In recent years, secure multi-party computation has received extensive attention in academia and industry. Secure multi-party computation allows multiple participants with private inputs to jointly compute a multi-input function without revealing any information about the private inputs of each participant,which makes the data available but invisible. As a fundamental problem in secure multi-party computation, privacy-preserving sorting allows multiple participants to compute the joint sorting result of multiple datasets without disclosing the privacy of the datasets and the sorting result,which has a wide range of application needs and values,such as product pricing, auctions, interest recommendations. Most of the existing privacy-preserving sorting protocols only support two participants,and cannot meet the joint sorting requirements of multiple participants in practical scenarios. The existing multi-party multi-data sorting protocols have the problems of high communication overhead,high computational complexity. As a result,they all suffer low overall efficiency. At the same time, the existing privacy-preserving sorting protocols do not consider the malicious security model of exhaustive attacks by malicious participants, and only realize security under the semi-honest adversary model, thus providing insufficient security protection against the more realistic malicious adversary model. In this paper,we propose an efficient privacy-preserving multi-party multi-data sorting protocol to overcome the above problems. Through this protocol,multiple participants can collectively compute the sorting results of their data in a privacy-preserving way with only O(1) rounds of interaction. Specifically, this paper designs a polynomial-based encoding method that encodes a participant′s dataset as a polynomial. In such a polynomial,the exponent and coefficient represent the data and the number of the data,respectively. Therefore,the sorting of multiple participant datasets can be realized by polynomial addition. For the above polynomial-based encoding algorithms,this paper also proposes polynomial encryption, aggregate polynomial generation, and decryption polynomial generation algorithms to realize the privacy protection of the encoded polynomials of each dataset based on the guarantee of computational correctness. The above algorithms can ensure the security of the encoded polynomials at the cost of low computational and communication overheads. Finally, each participant obtains the sorting result in a privacy-preserving way by means of communication-efficient oblivious transfer. In this paper,we consider a more realistic security model,provide for the first time the definition of malicious security under the non-colluding participant exhaustive attack, and define ideal functionalities of privacy-preserving sorting in different security models. The security analysis shows that the proposed protocol not only achieves semi-honest security, but also achieves malicious security against the exhaustive attack of non-colluding malicious users. In addition, a large number of experiments show that the proposed protocol is very efficient in both communication and computation. For example,when the number of participants is 15,each participant holds 20 000 data,and the upper bound of data is 500 000, our protocol’s communication and computation overheads are 898. 44 MB and 69. 76 s, which are only 12. 08% and 76. 85% of that of the LDYW protocol. Compared with the AHM+ scheme,our protocol’s computational efficiency is improved by about 20 times with only 4 times increase in the communication overhead. © 2024 Science Press. All rights reserved.
引用
收藏
页码:1832 / 1852
相关论文
共 50 条
  • [1] Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing
    Areekijseree, Katchaguy
    Tang, Yuzhe
    Chen, Ju
    Wang, Shuang
    Iyengar, Arun
    Palanisamy, Balaji
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 71 - 94
  • [2] Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data
    Ding, Xiaofeng
    Wang, Zuan
    Zhou, Pan
    Choo, Kim-Kwang Raymond
    Jin, Hai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 4589 - 4604
  • [3] Privacy-preserving Multi-party Analytics over Arbitrarily Partitioned Data
    Mehnaz, Shagufta
    Bertino, Elisa
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 342 - 349
  • [4] Privacy-Preserving Multi-Party Clustering: An Empirical Study
    Silva, Arlei
    Bellala, Gowtham
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 326 - 333
  • [5] Privacy-Preserving Query Processing by Multi-Party Computation
    Sepehri, Maryam
    Cimato, Stelvio
    Damiani, Ernesto
    COMPUTER JOURNAL, 2015, 58 (10): : 2195 - 2212
  • [6] Privacy-Preserving Multi-Party Conditional Random Selection
    Wueller, Stefan
    Assadsolimani, Benjamin
    Meyer, Ulrike
    Forg, Fabian
    Wetzel, Susanne
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 317 - 323
  • [7] Efficient privacy-preserving Gaussian process via secure multi-party computation
    Liu, Shiyu
    Luo, Jinglong
    Zhang, Yehong
    Wang, Hui
    Yu, Yue
    Xu, Zenglin
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 151
  • [8] Efficient and Scalable Multi-party Privacy-Preserving k-NN Classification
    Li, Xinglei
    Qian, Haifeng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT II, SECURECOMM 2023, 2025, 568 : 266 - 286
  • [9] Multi-party privacy-preserving decision tree training with a privileged party
    Tong, Yiwen
    Feng, Qi
    Luo, Min
    He, Debiao
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (08)
  • [10] Multi-party privacy-preserving decision tree training with a privileged party
    Yiwen TONG
    Qi FENG
    Min LUO
    Debiao HE
    Science China(Information Sciences), 2024, 67 (08) : 253 - 268