Fast Privacy-Preserving Top-k Queries Using Secret Sharing

作者: Martin Burkhart , Xenofontas Dimitropoulos

DOI: 10.1109/ICCCN.2010.5560086

关键词:

摘要: Over the past several years a lot of research has focused on distributed top-k computation. In this work we are interested in following privacy-preserving problem. A set parties hold private lists key-value pairs and want to find disclose k with largest aggregate values without revealing any other information. We use secure multiparty computation (MPC) techniques solve problem design two MPC protocols, PPTK PPTKS, putting emphasis their efficiency. uses hash table condense possibly large sparse space keys probabilistically estimate keys. PPTKS multiple tables, i.e., sketches, improve estimation accuracy PPTK. evaluate our protocols using real traffic traces show that they accurately efficiently distributions IP addresses port numbers globally most frequent numbers.

参考文章(20)
Xenofontas Dimitropoulos, Martin Burkhart, Mario Strasser, Dilip Many, SEPIA: privacy-preserving aggregation of multi-domain network events and statistics usenix security symposium. pp. 15- 15 ,(2010)
Noam Nisan, Benny Pinkas, Yaron Sella, Dahlia Malkhi, Fairplay—a secure two-party computation system usenix security symposium. pp. 20- 20 ,(2004)
Dan Bogdanov, Sven Laur, Jan Willemson, Sharemind: A Framework for Fast Privacy-Preserving Computations european symposium on research in computer security. pp. 192- 206 ,(2008) , 10.1007/978-3-540-88313-5_13
Gagan Aggarwal, Nina Mishra, Benny Pinkas, Secure Computation of the k th -Ranked Element theory and application of cryptographic techniques. pp. 40- 55 ,(2004) , 10.1007/978-3-540-24676-3_3
Takashi Nishide, Kazuo Ohta, Multiparty computation for interval, equality, and comparison without bit-decomposition protocol public key cryptography. ,vol. 343, pp. 343- 360 ,(2007) , 10.1007/978-3-540-71677-8_23
Assaf Ben-David, Noam Nisan, Benny Pinkas, FairplayMP Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. pp. 257- 266 ,(2008) , 10.1145/1455770.1455804
Michael Ben-Or, Shafi Goldwasser, Avi Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation symposium on the theory of computing. pp. 1- 10 ,(1988) , 10.1145/62212.62213
Ronald Fagin, Combining Fuzzy Information from Multiple Systems Journal of Computer and System Sciences. ,vol. 58, pp. 83- 99 ,(1999) , 10.1006/JCSS.1998.1600
Rosario Gennaro, Michael O. Rabin, Tal Rabin, Simplified VSS and fast-track multiparty computations with applications to threshold cryptography principles of distributed computing. pp. 101- 111 ,(1998) , 10.1145/277697.277716
Kevin Chen-Chuan Chang, Seung-won Hwang, Minimal probing Proceedings of the 2002 ACM SIGMOD international conference on Management of data - SIGMOD '02. pp. 346- 357 ,(2002) , 10.1145/564691.564731