A Distance-Sensitive Attribute Based Cryptosystem for Privacy-Preserving Querying

We propose an attribute-based cryptosystem in which decryption is conditional on the distance between attributes. Alice constructs a cipher text that consists of an encrypted message and a hidden attribute vector. Bob is able to decrypt Alice's message if and only if his attribute vector is within a specified maximum distance from Alice's attribute vector. We provide constructions for Euclidean and Hamming distances. The cryptosystem has advantages for privacy preserving querying. In particular, all parties can broadcast their respective cipher texts or store them on a database server. Then, a client -- not necessarily belonging to the original set of parties -- can independently and privately query the database server for cipher texts whose attributes are within some small distance from its own attribute. We describe an application of this cryptosystem in which a customer obtains recommendations from other customers of a movie rental company in a privacy-preserving manner.

[1]  Vipin Kumar,et al.  Privacy Preserving Nearest Neighbor Search , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).

[2]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[3]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[4]  Craig Gentry,et al.  Computing arbitrary functions of encrypted data , 2010, CACM.

[5]  Mikhail J. Atallah,et al.  Secure outsourcing of sequence comparisons , 2004, International Journal of Information Security.

[6]  Allison Bishop,et al.  Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.

[7]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[8]  Ye Zhang,et al.  Anonymous Fuzzy Identity-Based Encryption for Similarity Search , 2010, ISAAC.

[9]  Joseph H. Silverman,et al.  The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.

[10]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[11]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[12]  Ronald Cramer,et al.  Introduction to Secure Computation , 1998, Lectures on Data Security.

[13]  Zekeriya Erkin,et al.  Efficiently computing private recommendations , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[15]  Mikhail J. Atallah,et al.  Efficient Privacy-Preserving k-Nearest Neighbor Search , 2008, 2008 The 28th International Conference on Distributed Computing Systems.