IFIP International Federation for Information Processing
DOI: 10.1007/978-0-387-73655-6_1
|View full text |Cite
|
Sign up to set email alerts
|

Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust

Abstract: In this paper, we first present a private distributed scalar product protocol that can be used for obtaining trust values from private recommendations. Our protocol allows Alice to infer the trustworthiness of Bob based on what Alice's friends think about Bob and Alice's confidence in her fiiends. In addition, the private information of Alice and her fiiends are not revealed during the computation. We also propose a credential-based trust model where the trustworthiness of a user is computed based on his or he… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 20 publications
(23 citation statements)
references
References 33 publications
0
23
0
Order By: Relevance
“…If a resource owner thinks organization A is more reputable than organization B, the resource owner specifies a higher point value for a credential issued by A than the one issued by B. This idea has been explored in a recent paper that quantitatively studies the connections between computational trust/reputation models with point values in point-based trust management [Yao et al 2007]. The article also discusses the application of such models in privacy-preserving location systems [Yao et al 2007].…”
Section: Point-based Trust Managementmentioning
confidence: 97%
“…If a resource owner thinks organization A is more reputable than organization B, the resource owner specifies a higher point value for a credential issued by A than the one issued by B. This idea has been explored in a recent paper that quantitatively studies the connections between computational trust/reputation models with point values in point-based trust management [Yao et al 2007]. The article also discusses the application of such models in privacy-preserving location systems [Yao et al 2007].…”
Section: Point-based Trust Managementmentioning
confidence: 97%
“…[17] put forward the protocol based on homomorphic encryption computation. For the special case l = n + 1, Yao et al presented a multi-party computation protocol for computing weighted trust values [4]. This protocol is split in two phases: an homomorphic encryption com putation and a private multi-party summation protocol [IS].…”
Section: A Private Distributed Scalar Product Protocolmentioning
confidence: 99%
“…This protocol is split in two phases: an homomorphic encryption com putation and a private multi-party summation protocol [IS]. In [19], Melchor proved that the protocol of [4] is not secure in the semi-honest model by showing that it is not resistant to collusion attacks, and they proposed to use a superposed sending round as an alteruative to the multi-party summation protocol, which results in better security properties and in a reduction of the communication costs.…”
Section: A Private Distributed Scalar Product Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…In [13], authors proposed a general protocol for privacy preserving multiparty scalar product computations which be used for obtaining trust values from private recommendations. They also proposed credential based trust model where the trustworthiness of the user is computed based on his/her affiliations and role assignments.…”
Section: Privacy Preserving Association Rule Mining For Vertically Pamentioning
confidence: 99%