Privacy Preserving Data Mining

作者: Yehuda Lindell , Benny Pinkas

DOI: 10.1007/3-540-44598-6_3

关键词:

摘要: In this paper we introduce the concept of privacy preserving data mining. our model, two parties owning confidential databases wish to run a mining algorithm on union their databases, without revealing any unnecessary information. This problem has many practical and important applications, such as in medical research with patient records. Data algorithms are usually complex, especially size input is measured megabytes, if not gigabytes. A generic secure multi-party computation solution, based evaluation circuit computing entire input, therefore no use. We focus decision tree learning use ID3, popular widely used for problem. present solution that considerably more efficient than solutions. It demands very few rounds communication reasonable bandwidth. each party performs by itself same order ID3 its own database. The results then combined using cryptographic protocols, whose overhead only logarithmic number transactions databases. feel result substantial contribution, demonstrating can be made practical, even complex problems large inputs.

参考文章(21)
Oded Goldreich, , Silvio Micali, Avi Wigderson, , , How to play any mental game, or a completeness theorem for protocols with honest majority Providing Sound Foundations for Cryptography. pp. 307- 328 ,(2019) , 10.1145/3335741.3335755
Dan Boneh, Matthew Franklin, Efficient Generation of Shared RSA Keys (Extended Abstract) international cryptology conference. pp. 425- 439 ,(1997) , 10.1007/BFB0052253
Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin J. Strauss, Rebecca N. Wright, Secure Multiparty Computation of Approximations international colloquium on automata languages and programming. pp. 927- 938 ,(2001) , 10.1007/3-540-48224-5_75
Moni Naor, Benny Pinkas, None, Distributed Oblivious Transfer international conference on the theory and application of cryptology and information security. pp. 205- 219 ,(2000) , 10.1007/3-540-44448-3_16
Mihir Bellare, Silvio Micali, Non-interactive oblivious transfer and applications international cryptology conference. pp. 547- 557 ,(1989) , 10.1007/0-387-34805-0_48
Niv Gilboa, Two Party RSA Key Generation international cryptology conference. pp. 116- 129 ,(1999) , 10.1007/3-540-48405-1_8
Benny Pinkas, Moni Naor, Efficient oblivious transfer protocols symposium on discrete algorithms. pp. 448- 457 ,(2001) , 10.5555/365411.365502
Shimon Even, Oded Goldreich, Abraham Lempel, A randomized protocol for signing contracts Communications of the ACM. ,vol. 28, pp. 637- 647 ,(1985) , 10.1145/3812.3818
Ran Canetti, Security and Composition of Multiparty Cryptographic Protocols Journal of Cryptology. ,vol. 13, pp. 143- 202 ,(2000) , 10.1007/S001459910006
Michael Ben-Or, Shafi Goldwasser, Avi Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation symposium on the theory of computing. pp. 1- 10 ,(1988) , 10.1145/62212.62213