You can view the full text of this article for free using the link below.

Title: Privacy preserving computation of scalar product and sign of scalar product

Authors: Subrata Bose

Addresses: Department of Computer Science and Engineering, Neotia Institute of Technology, Management and Science, Diamond Harbour Road, South 24 Parganas, West Bengal 743368, India

Abstract: Scalar product is repeatedly used in a large family of applications. It is a useful building block of many scientific and business applications. Secure scalar product computation is widely used in many privacy-preserving computation domains. In this work, we have proposed privacy preserving protocols for computing scalar product or only its sign. These protocols work on two basic principles - random data perturbation and algebraic methods, and thus avoid standard encryption/decryption overheads. We have designed the protocols to get sign of the scalar product, which can act as a basic building block in privacy preserving database queries over distributed databases and many other applications. We have developed two sets of protocols for the two-party computation with and without using an untrusted third-party. Experimental results on generated random datasets show that the proposed protocols indeed involve low communication overhead.

Keywords: secure multi-party computation; two-party protocol; privacy preserving database query processing; privacy preserving data mining.

DOI: 10.1504/IJITST.2019.098164

International Journal of Internet Technology and Secured Transactions, 2019 Vol.9 No.1/2, pp.112 - 135

Received: 14 Mar 2017
Accepted: 05 Oct 2017

Published online: 28 Feb 2019 *

Full-text access for editors Access for subscribers Free access Comment on this article