2005
DOI: 10.1007/11496618_9
|View full text |Cite
|
Sign up to set email alerts
|

On Private Scalar Product Computation for Privacy-Preserving Data Mining

Abstract: Abstract. In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mining protocol depends on the security of the underlying private scalar product protocol. We show that two of the private scalar product protocols, one of which was proposed in a leading data mining conference, are insecure. We then describe a provably private scalar product protocol that is based on homomorphic encryption a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
345
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 273 publications
(345 citation statements)
references
References 16 publications
0
345
0
Order By: Relevance
“…The immediate uses lie in appointment scheduling, flexible timestamp verification, biometrics, etc. Certain kinds of set intersection problems, as studied in [7,9], can be represented succinctly as GT instances, resulting in more efficient solutions using our constructions.…”
Section: Introductionmentioning
confidence: 99%
“…The immediate uses lie in appointment scheduling, flexible timestamp verification, biometrics, etc. Certain kinds of set intersection problems, as studied in [7,9], can be represented succinctly as GT instances, resulting in more efficient solutions using our constructions.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore this definition has no mention of information leakage due to the protocol itself, however it could be amended so that the definition must hold for the intermediate messages as well as the final output. An analysis of some weakly secure inner product protocols is given by [15], who conclude that the weaker model presents a far greater prospect of information leakage than does the cryptographic model.…”
Section: Alternative Security Modelsmentioning
confidence: 99%
“…It appears that despite the elegance of this approach, the third party would still be able to mount a frequency based attack on these embeddings. Nevertheless the metric embedding idea is compelling since it results in lowdimensional vectors [33], and so in principle it allows reduction of string edit distance computation to secure inner products which are already well-studied in the literature (e.g., [15]). …”
Section: Record Pair Similaritymentioning
confidence: 99%
See 1 more Smart Citation
“…For example, several solutions have been proposed that use SMC to enhance privacy in auctions [12], data clustering [13], [14] or filtering [15]. Recently, there is also an increased interest in combining SMC with methods of signal processing in order to be able to privately analyze signals; examples are the analysis of medical signals [16] or the evaluation of biometrics on encrypted data [2].…”
Section: Secure Multiparty Computation (Smc) Several Constructions Fmentioning
confidence: 99%