TY - JOUR
T1 - An Efficient Privacy-Preserving Protocol for Computing k th Minimum Value in P2P Networks
AU - Huang, Yue
AU - Zeng, Peng
AU - Choo, Kim Kwang Raymond
N1 - Publisher Copyright:
© 2020 World Scientific Publishing Company.
PY - 2020/7/1
Y1 - 2020/7/1
N2 - Statistics such as kth minimum value play a crucial role in our data-driven society, for example by informing decision-making. In this paper, we propose an efficient privacy-preserving protocol that allows a group of users who do not trust each other, for example in a peer-to-peer (P2P) network, to jointly calculate the kth minimum value. Specifically, in our proposed protocol each user's data is converted to a binary bit string following a certain rule. Then, the bits at the same position are aggregated from the leftmost to the rightmost. As far as we know, this is the first published scheme to obtain kth minimum value in a P2P network without affecting users' privacy. We also remark that the proposed protocol can be easily generalized to compute other statistics, such as maximum value, minimum value, and median value, while achieving high efficiency in a privacy-preserving P2P network. We then demonstrate that the proposed protocol achieves forward security and is resilient to a range of external and internal attacks.
AB - Statistics such as kth minimum value play a crucial role in our data-driven society, for example by informing decision-making. In this paper, we propose an efficient privacy-preserving protocol that allows a group of users who do not trust each other, for example in a peer-to-peer (P2P) network, to jointly calculate the kth minimum value. Specifically, in our proposed protocol each user's data is converted to a binary bit string following a certain rule. Then, the bits at the same position are aggregated from the leftmost to the rightmost. As far as we know, this is the first published scheme to obtain kth minimum value in a P2P network without affecting users' privacy. We also remark that the proposed protocol can be easily generalized to compute other statistics, such as maximum value, minimum value, and median value, while achieving high efficiency in a privacy-preserving P2P network. We then demonstrate that the proposed protocol achieves forward security and is resilient to a range of external and internal attacks.
KW - Data aggregation
KW - P2P networks
KW - k th minimum
KW - median
KW - privacy-preserving
UR - https://www.scopus.com/pages/publications/85075151795
U2 - 10.1142/S0218126620501388
DO - 10.1142/S0218126620501388
M3 - 文章
AN - SCOPUS:85075151795
SN - 0218-1266
VL - 29
JO - Journal of Circuits, Systems and Computers
JF - Journal of Circuits, Systems and Computers
IS - 9
M1 - 2050138
ER -