Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2006: Data and Applications Security XX pp 310–317Cite as

  1. Home
  2. Data and Applications Security XX
  3. Conference paper
Information Theoretical Analysis of Two-Party Secret Computation

Information Theoretical Analysis of Two-Party Secret Computation

  • Da-Wei Wang18,
  • Churn-Jung Liau18,
  • Yi-Ting Chiang18 &
  • …
  • Tsan-sheng Hsu18 
  • Conference paper
  • 571 Accesses

  • 8 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4127)

Abstract

Privacy protection has become one of the most important issues in the information era. Consequently, many protocols have been developed to achieve the goal of accomplishing a computational task cooperatively without revealing the participants’ private data. Practical protocols, however, do not guarantee perfect privacy protection, as some degree of privacy leakage is allowed so that resources can be used efficiently, e.g., the number of random bits required and the computation time. A metric for measuring the degree of information leakage based on an information theoretical framework was proposed in [2]. Based on that formal framework, we present a lower bound of the scalar product problem in this paper, and show that to solve the problem without the help of a third party, approximately half the private information must be revealed. To better capture our intuition about the secrecy of various protocols, we propose two more measurements: evenness and spread. The first measures how evenly the information leakage is distributed among the participants’ private inputs. The second measures the size of the smallest set an adversary could use to obtain the same ratio of leaked information that could be derived in the worst case scenario.

Keywords

  • Privacy Analysis
  • Private Computation
  • Scalar Product

Chapter PDF

Download to read the full chapter text

References

  1. Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.-R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165–179. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  2. Chiang, Y.-T., Wang, D.-W., Liau, C.-J., Hsu, T.-s.: Secrecy of two-party secure computation. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol. 3654, pp. 114–123. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  3. Du, W., Atallah, M.J.: Privacy-preserving cooperative statistical analysis. In: Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, pp. 102–110 (December 2001)

    Google Scholar 

  4. Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: A review and open problems. In: New Security Paradigms Workshop, Cloudcroft, New, Mexico, USA, pp. 11–20 (September 2001)

    Google Scholar 

  5. Du, W., Zhan, Z.: A practical approach to solve secure multi-party computation problems. In: Proceedings of New Security Paradigms Workshop, Virginia Beach, Virginia, USA (September 2002)

    Google Scholar 

  6. Goldreich, O.: Foundations of Cryptography. Basic Aplications, vol. II. Cambridge (2004)

    Google Scholar 

  7. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or: A completeness theorem for protocols with honest majority. In: Proc. 19th ACM Symposium on Theory of Computing, pp. 218–229 (1987)

    Google Scholar 

  8. Kantarcoglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering 16(9), 1026–1037 (2004)

    CrossRef  Google Scholar 

  9. Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay – a secure two-party computation system. In: Proceedings of the 13th Symposium on Security, Usenix, pp. 287–302 (2004)

    Google Scholar 

  10. Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 639–644 (July 2002)

    Google Scholar 

  11. Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th Annual IEEE Symposium on Foundations of Computer Science, pp. 162–167 (November 1986)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Institute of Information Science, Academia Sinica, Taipei, 115, Taiwan

    Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang & Tsan-sheng Hsu

Authors
  1. Da-Wei Wang
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Churn-Jung Liau
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Yi-Ting Chiang
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Tsan-sheng Hsu
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Italy

    Ernesto Damiani

  2. The Logistics Institute, Northeastern University, Shenyang, China

    Peng Liu

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 IFIP International Federation for Information Processing

About this paper

Cite this paper

Wang, DW., Liau, CJ., Chiang, YT., Hsu, Ts. (2006). Information Theoretical Analysis of Two-Party Secret Computation. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_22

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11805588_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36796-3

  • Online ISBN: 978-3-540-36799-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature