Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol

  • Sedigheh Abbasi
  • Stelvio Cimato
  • Ernesto Damiani
Conference paper

DOI: 10.1007/978-3-642-36818-9_49

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7804)
Cite this paper as:
Abbasi S., Cimato S., Damiani E. (2013) Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol. In: Mustofa K., Neuhold E.J., Tjoa A.M., Weippl E., You I. (eds) Information and Communication Technology. ICT-EurAsia 2013. Lecture Notes in Computer Science, vol 7804. Springer, Berlin, Heidelberg

Abstract

Despite a large amount of research work has been done and a large number of results produced, the deployment of Secure Multi-party Computation (SMC) protocols for solving practical problems in real world scenarios is still an issue. This is mainly due to the complexity of the SMC-based solutions and to the needed assumptions that are not easy to fit to the considered problem. In this paper we propose an innovative approach for the deployment of SMC, providing a tradeoff between efficiency and privacy. In the Secure Clustered Multi-Party Computation (SCMC) approach, a function is more efficiently computed through reducing the number of participants to the SMC protocol by clustering, such that a reasonable privacy leakage inside the cluster is allowed. Toward this direction, this paper verifies the impact and the feasibility of applying different clustering techniques over the participants to a SMC protocol and proposes an effective specifically-tailored clustering protocol.

Keywords

Secure Multi-Party Computation Privacy-Preserving Clustering Privacy and Efficiency Tradeoff 

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Sedigheh Abbasi
    • 1
  • Stelvio Cimato
    • 1
  • Ernesto Damiani
    • 1
  1. 1.DI - Universitá degli Studi di MilanoCremaItaly

Personalised recommendations