JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >
このアイテムの引用には次の識別子を使用してください:
http://hdl.handle.net/10119/9591
|
タイトル: | Efficient Privacy-Preserving Data Mining in Malicious Model |
著者: | Emura, Keita Miyaji, Atsuko Rahman, Mohammad Shahriar |
キーワード: | Privacy-preserving Data Mining Malicious Model Threshold Two-party Computation Efficiency |
発行日: | 2010 |
出版者: | Springer |
誌名: | Lecture Notes in Computer Science |
巻: | 6440/2010 |
開始ページ: | 370 |
終了ページ: | 382 |
DOI: | 10.1007/978-3-642-17316-5_36 |
抄録: | In many distributed data mining settings, disclosure of theoriginal data sets is not acceptable due to privacy concerns. To address such concerns, privacy-preserving data mining has been an active research area in recent years. While confidentiality is a key issue, scalability is also an important aspect to assess the performance of a privacypreserving data mining algorithms for practical applications. With this in mind, Kantarcioglu et al. proposed secure dot product and secure setintersectionprotocols for privacy-preserving data mining in maliciousadversarial model using zero knowledge proofs, since the assumption of semi-honest adversary is unrealistic in some settings. Both the computation and communication complexities are linear with the number of data items in the protocols proposed by Kantarcioglu et al. In this paper, we build efficient and secure dot product and set-intersection protocols in malicious model. In our work, the complexity of computation and communication for proof of knowledge is always constant (independent of thenumber of data items), while the complexity of computation and communication for the encrypted messages remains the same as in Kantarcioglu et al.’s work (linear with the number of data items). Furthermore, we provide the security model in Universal Composability framework. |
Rights: | This is the author-created version of Springer, Keita Emura, Atsuko Miyaji and Mohammad Shahriar Rahman, Lecture Notes in Computer Science, 6440/2010, 2010, 370-382. The original publication is available at www.springerlink.com, http://dx.doi.org/10.1007/978-3-642-17316-5_36 |
URI: | http://hdl.handle.net/10119/9591 |
資料タイプ: | author |
出現コレクション: | b10-1. 雑誌掲載論文 (Journal Articles)
|
このアイテムのファイル:
ファイル |
記述 |
サイズ | 形式 |
15720-1.pdf | | 312Kb | Adobe PDF | 見る/開く |
|
当システムに保管されているアイテムはすべて著作権により保護されています。
|