An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks

Statistics such as kth minimum value play a crucial role in our data-driven society, for example by informing decision-making. In this paper, we propose an efficient privacy-preserving protocol tha...

[1]  Keqin Li,et al.  Fast Functional Safety Verification for Distributed Automotive Applications During Early Design Phase , 2018, IEEE Transactions on Industrial Electronics.

[2]  Li Liu,et al.  Synchronization Stability Analysis of Medical Cyber-Physical Cloud System Considering Multi-Closed-Loops , 2019, J. Circuits Syst. Comput..

[3]  Durgesh Kumar Mishra,et al.  Protocols for Getting Maximum Value for Multi-Party Computations , 2010, 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation.

[4]  Gang Xu,et al.  Secure multiparty computation of a comparison problem , 2016, SpringerPlus.

[5]  Rui Zhang,et al.  PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[6]  Keqin Li,et al.  System-Level Energy-Aware Design Methodology Towards End-To-End Response Time Optimization , 2019, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[7]  Keqin Li,et al.  Enhanced Parallel Application Scheduling Algorithm with Energy Consumption Constraint in Heterogeneous Distributed Systems , 2019, J. Circuits Syst. Comput..

[8]  Zekeriya Erkin,et al.  Secure Comparison Protocols in the Semi-Honest Model , 2015, IEEE Journal of Selected Topics in Signal Processing.

[9]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[10]  Song Guo,et al.  Privacy-preserving Data Aggregation Computing in Cyber-Physical Social Systems , 2018, ACM Trans. Cyber Phys. Syst..

[11]  Maede Ashouri-Talouki An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries , 2018, Peer Peer Netw. Appl..

[12]  Qinghua Li,et al.  Efficient and privacy-preserving data aggregation in mobile sensing , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[13]  Xue Liu,et al.  PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[14]  Jin Sun,et al.  Improving Availability of Multicore Real-Time Systems Suffering Both Permanent and Transient Faults , 2019, IEEE Transactions on Computers.

[15]  Qinghua Li,et al.  Efficient and Privacy-Aware Data Aggregation in Mobile Sensing , 2014, IEEE Transactions on Dependable and Secure Computing.

[16]  Zhiwei Steven Wu,et al.  Privacy-Preserving Generative Deep Neural Networks Support Clinical Data Sharing , 2017, bioRxiv.

[17]  Yuan Zhang,et al.  Securely min and k-th min computations with fully homomorphic encryption , 2017, Science China Information Sciences.