New Attacks against Transformation-Based Privacy-Preserving Linear Programming

In this paper we demonstrate a number of attacks against proposed protocols for privacy-preserving linear programming, based on publishing and solving a transformed version of the problem instance. Our attacks exploit the geometric structure of the problem, which has mostly been overlooked in the previous analyses and is largely preserved by the proposed transformations. The attacks are efficient in practice and cast serious doubt to the viability of transformation-based approaches in general.

[1]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Jaideep Vaidya,et al.  An inference–proof approach to privacy-preserving horizontally partitioned linear programs , 2014, Optim. Lett..

[3]  Wenliang Du,et al.  A study of several specific secure two-party computation problems , 2001 .

[4]  Olvi L. Mangasarian Privacy-preserving linear programming , 2011, Optim. Lett..

[5]  Florian Kerschbaum,et al.  Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[6]  Tomas Toft Solving Linear Programs Using Multiparty Computation , 2009, Financial Cryptography.

[7]  Matthew Roughan,et al.  Hiccups on the road to privacy-preserving linear programming , 2009, WPES '09.

[8]  Jaideep Vaidya,et al.  Privacy-preserving linear programming , 2009, SAC '09.

[9]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.

[10]  Alice Bednarz,et al.  Methods for two-party privacy-preserving linear programming. , 2012 .

[11]  Olvi L. Mangasarian Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..

[12]  Mikhail J. Atallah,et al.  Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[13]  Jaideep Vaidya,et al.  Secure and efficient distributed linear programming , 2012, J. Comput. Secur..

[14]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[15]  Wei Li,et al.  Privacy-preserving horizontally partitioned linear programs with inequality constraints , 2013, Optim. Lett..