Zero-knowledge test of vector equivalence granulation of user data with privacy

This paper introduces a new framework for privacy preserving computation to the granular computing community. The framework is called P4P (Peers for Privacy) and features a unique architecture and practical protocols for user data validation and vector addition-based computation. It turned out that many non-trivial and non-linear computations can be done using an iterative algorithm with vector-addition aggregation steps. Examples include voting, summation, SVD, regression, and ANOVA etc. P4P allows them to be carried out while preserving users privacy. To demonstrate its application in granular computing, we present two practical protocols that test the equality of user vectors in zero-knowledge. Our protocols only involve constant number of public key operations (independent of vector size) and are very efficient. These protocols can be used to perform granulation, which is a fundamental task of granular computing, in a privacy-preserving manner. They can also be of independent interest for other fields such as data mining as well.

[1]  Leonid A. Levin,et al.  Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.

[2]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[3]  Donald Beaver,et al.  Multiparty Computation with Faulty Majority , 1989, CRYPTO.

[4]  John F. Canny,et al.  Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[5]  Z. Pawlak Rough Sets: Theoretical Aspects of Reasoning about Data , 1991 .

[6]  J. Markus,et al.  Millimix: Mixing in Small Batches , 1999 .

[7]  Churn-Jung Liau,et al.  A generalized decision logic language for granular computing , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).

[8]  Ivan Damgård,et al.  Zero-Knowledge Proofs for Finite Field Arithmetic; or: Can Zero-Knowledge be for Free? , 1998, CRYPTO.

[9]  Lotfi A. Zadeh,et al.  Fuzzy sets and information granularity , 1996 .

[10]  Yitao Duan,et al.  Practical private computation of vector addition-based functions , 2007, PODC '07.

[11]  Janusz Zalewski,et al.  Rough sets: Theoretical aspects of reasoning about data , 1996 .

[12]  Tsau Young Lin,et al.  Granular Computing on Binary Relations , 2002, Rough Sets and Current Trends in Computing.

[13]  Zdzislaw Pawlak,et al.  Reasoning about Data - A Rough Set Perspective , 1998, Rough Sets and Current Trends in Computing.

[14]  Andrzej Skowron,et al.  Toward Intelligent Systems: Calculi of Information Granules , 2001, JSAI Workshops.

[15]  Yiyu Yao,et al.  A Partition Model of Granular Computing , 2004, Trans. Rough Sets.

[16]  Ivan Damgård,et al.  Zero-Knowledge Proofs for Finite Field Arithmetic or: Can Zero-Knowledge be for Free? , 1997 .

[17]  Yiyu Yao,et al.  Granular computing using information tables , 2002 .

[18]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[19]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[20]  Tal Rabin,et al.  Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.

[21]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.