Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol

被引:0
|
作者
Ohata, Satsuya [1 ]
Morita, Hiraku [1 ]
Hanaoka, Goichiro [1 ]
机构
[1] AIST, Tokyo, Japan
关键词
MULTIPARTY COMPUTATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function, while keeping their inputs private. We can consider many applications of MPC and various operations/protocols for MPC have been proposed. We focus on (privacy-preserving) division protocols in this paper. Although division is included in four arithmetic operations, we need extremely high computation/communication costs in privacypreserving settings compared with other operations. Especially, we need many communication rounds for error correction to get accurate quotients. Since we iterate error correction procedure for several times in the division protocol, we can expect to reduce communication rounds by removing error correcting iterations. In this strategy, however, we cannot obtain accurate quotients. In this paper, we show experimental results about a relation between accuracy of quotients obtained by the round-reduced division protocol and the number of communication rounds we need. From our results, we find the error of quotients becomes less than 0:1% even if we reduce the number of communication rounds for error correction to 33%. This property will be useful when we make concrete applications efficient in some cases.
引用
收藏
页码:535 / 539
页数:5
相关论文
共 50 条
  • [21] Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective
    Rezaei, Shahbaz
    Shafiq, Zubair
    Liu, Xin
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 364 - 381
  • [22] Enhancing Accuracy-Privacy Trade-Off in Differentially Private Split Learning
    Pham, Ngoc Duy
    Phan, Khoa T.
    Chilamkurti, Naveen
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2025, 9 (01): : 988 - 1000
  • [23] On the efficiency and equity trade-off
    Correira, IH
    JOURNAL OF MONETARY ECONOMICS, 1999, 44 (03) : 581 - 603
  • [24] Privacy-Preserving Protocol for Epidemiology in Effect of Radiation
    Kikuchi, Hiroaki
    Sato, Tomoki
    Sakuma, Jun
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 831 - 836
  • [25] Privacy-Preserving Protocol for Data Stored in the Cloud
    Hongyi Su Geng Yang Dawei Li (College of Computer Science
    ZTE Communications, 2011, 9 (02) : 36 - 38
  • [26] Efficient Privacy-Preserving Face Identification Protocol
    Huang, Hai
    Wang, Luyao
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (04) : 2632 - 2641
  • [27] Privacy-preserving Practical Convex Hulls Protocol
    Zhu, Youwen
    Huang, Liusheng
    Yang, Wei
    Chen, Zhili
    Li, Lingjun
    Yu, Zhenshan
    Luo, Yonglong
    FCST: 2008 JAPAN-CHINA JOINT WORKSHOP ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2008, : 10 - 16
  • [28] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [29] A protocol for privacy-preserving closest pair of points
    Liu, Jie
    Yang, Bo
    Pang, Xiaoqiong
    Liu, J. (jessica.lyh66@gmail.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09): : 6945 - 6953
  • [30] Strongly Privacy-Preserving Communication Protocol for VANETs
    Fan, Chun-I
    Sun, Wei-Zhe
    Huang, Shih-Wei
    Juang, Wen-Shenq
    Huang, Jheng-Jia
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 119 - 126