Skip to main content

Secure Sum Computation Using Homomorphic Encryption

  • Conference paper
  • First Online:
Data Science and Big Data Analytics

Abstract

Secure sum allows cooperating parties to compute sum of their private data without revealing their individual data to one another. Many secure sum protocols exists in the literature. Most of them assume network to be secure. In this paper we drop that assumption and provide a protocol that is applicable to insecure networks as well. We used additive homomorphic encryption technique for secure sum computation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. http://en.wikipedia.org/wiki/Secure_multi-party_computation

  2. Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY (2002) Tools for privacy-preserving distributed data mining. J. SIGKDD Explor Newsl 4(2):28–34. ACM Press

    Google Scholar 

  3. Sheikh R, Kumar B, Mishra DK (2010) Changing neighbors k-secure sum protocol for secure multi-party computation. Int J of Comput Sci Inf Secur, USA, 7(1) (Accepted for publication)

    Google Scholar 

  4. Sheikh R, Kumar B, Mishra DK (2009) Privacy-preserving k-secure sum protocol. Int J Comput Sci Inf Secur, USA, 6(2):184–188

    Google Scholar 

  5. Sheikh R, Kumar B, Mishra DK (2009) A distributed k-secure sum protocol for secure multi-party computation. Submitted to a journal

    Google Scholar 

  6. Yao AC (1982) Protocol for secure computations. In: Proceedings of the 23rd annual IEEE symposium on foundation of computer science, pp 160–164

    Google Scholar 

  7. Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: STOC’87: Proceedings of the nineteenth annual ACM conference on theory of computing, New York, NY, USA: ACM, pp 218–229

    Google Scholar 

  8. Chor B, Gilbao N (1997) Computationally private information retrieval (extended abstract). In: Proceedings of 29th annual ACM symposium on theory of computing, El Paso, TX USA, May 1997

    Google Scholar 

  9. Chor B, Kushilevitz E, Goldreich O, Sudan M (1995) Private information retrieval. In: Proceedings of the 36th annual IEEE symposium on foundations of computer science, Milwaukee WI, pp 41–50, Oct 1995

    Google Scholar 

  10. Lindell Y, Pinkas B (2000) Privacy preserving data mining in advances in cryptography-Crypto2000, lecture notes in computer science, vol 1880

    Google Scholar 

  11. Agrawal R, Srikant R (2000) Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD on management of data, Dallas, TX USA, pp 439–450, 15–18 May 2000

    Google Scholar 

  12. Atallah MJ, Du W (2001) Secure multiparty computational geometry. In: Proceedings of seventh international workshop on algorithms and data structures (WADS2001). Providence, Rhode Island, USA, pp 165–179, 8–10 Aug 2001

    Google Scholar 

  13. Du W, Atallah MJ (2001) Privacy-preserving cooperative scientific computations. In: 14th IEEE computer security foundations workshop, Nova Scotia, Canada, pp 273–282, 11–13 Jun 2001

    Google Scholar 

  14. Du W, Atallah MJ (2001) Privacy-preserving statistical analysis. In: Proceedings of the 17th annual computer security applications conference, New Orleans, Louisiana, USA, pp 102–110, 10–14 Dec 2001

    Google Scholar 

  15. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT’99, Prague, Czech Republic, pp 223–238, 2–6 May 1999

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashid Sheikh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sheikh, R., Mishra, D.K. (2019). Secure Sum Computation Using Homomorphic Encryption. In: Mishra, D., Yang, XS., Unal, A. (eds) Data Science and Big Data Analytics. Lecture Notes on Data Engineering and Communications Technologies, vol 16. Springer, Singapore. https://doi.org/10.1007/978-981-10-7641-1_31

Download citation

Publish with us

Policies and ethics