Secure Multiparty Overall Mean Computation via Oblivious Polynomial Evaluation

The number of opportunities for cooperative comput ation has exponentially been increasing with growing interact ion via Internet technologies. Most of the time, the communicating p arties may not want to disclose their private data to the other principal while taking the advantage of collaboration, hence concentrating on the results r ather than private and perhaps useless data values. To conduct such a computation while preserving the privacy of the inputs for a target case is referred to as Secure Multiparty Computation problem. In this work, the privacy pres erving overall mean computation problem is analyzed. We present two pro tocols for two-party and multi-party case via oblivious polynomial evaluatio n is used as a cryptographic mechanism to assure the security of the private dat a. Under given security assumptions, the privacy validity of the algorithms are justified.

[1]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[2]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[3]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[4]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[5]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[6]  Ran Canetti,et al.  Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.

[7]  Wenliang Du,et al.  Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[8]  Wenliang Du,et al.  Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.

[9]  Wenliang Du,et al.  Secure Multi-party Computational Geometry , 2001, WADS.

[10]  Wenliang Du,et al.  Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.

[11]  Oded Goldreich,et al.  The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .

[12]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.

[13]  Moni Naor,et al.  Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.

[14]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[15]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[16]  Somesh Jha,et al.  Privacy Preserving Clustering , 2005, ESORICS.