Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Secure multiparty computation of approximations

Published: 01 July 2006 Publication History

Abstract

Approximation algorithms can sometimes provide efficient solutions when no efficient exact computation is known. In particular, approximations are often useful in a distributed setting where the inputs are held by different parties and may be extremely large. Furthermore, for some applications, the parties want to compute a function of their inputs securely without revealing more information than necessary. In this work, we study the question of simultaneously addressing the above efficiency and security concerns via what we call secure approximations.We start by extending standard definitions of secure (exact) computation to the setting of secure approximations. Our definitions guarantee that no additional information is revealed by the approximation beyond what follows from the output of the function being approximated. We then study the complexity of specific secure approximation problems. In particular, we obtain a sublinear-communication protocol for securely approximating the Hamming distance and a polynomial-time protocol for securely approximating the permanent and related #P-hard problems.

References

[1]
Agrawal, R., and Srikant, R. 2000. Privacy preserving data mining. In Proceedings of the ACM SIGMOD Conference on Management of Data. ACM Press, 439--450.]]
[2]
Alon, N., Gibbons, P. B., Matias, Y., and Szegedy, M. 2002. Tracking join and self-join sizes in limited storage. J. Comput. Syst. Science 64, 3, 719--747.]]
[3]
Alon, N., Matias, Y., and Szegedy, M. 1999. The space complexity of approximating the frequency moments. J. Comput. Syst. Science 58, 1, 137--147.]]
[4]
Alon, N. and Spencer, J. 1992. The Probabilistic Method. John Wiley.]]
[5]
Bar-Yossef, Z. 2004. Personal Communication.]]
[6]
Beaver, D. 1991. Foundations of secure interactive computing. In Advances in Cryptology (CRYPTO'91) Lecture Notes in Computer Science vol. 576. Springer-Verlag, 377--391.]]
[7]
Beaver, D., Micali, S., and Rogaway, P. 1990. The round complexity of secure protocols. In Proceedings of the 22th Annual ACM Symposium on the Theory of Computing. 503--513.]]
[8]
Beimel, A., Carmi, P., Nissim, K., and Weinreb, E. 2006. Private approximation of search problems. In Proceedings of the 38th Annual ACM Symposium on the Theory of Computing. 119--128.]]
[9]
Ben-Or, M., Goldwasser, S., and Wigderson, A. 1988. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th Annual ACM Symposium on the Theory of Computing. ACM Press, 1--10.]]
[10]
Broder, A. 1986. How hard is it to marry at random? In Proceedings of the 18th Annual ACM Symposium on the Theory of Computing. 50--58. (Erratum in 20th STOC, p. 551.)]]
[11]
Cachin, C., Micali, S., and Stadler, M. 1999. Computationally private information retrieval with polylogarithmic communication. In Advances in Cryptology (EUROCRYPT'99). Lecture Notes in Computer Science vol. 1592. Springer-Verlag, 404--414.]]
[12]
Canetti, R. 2000. Security and composition of multiparty cryptographic protocols. J. Cryptology 13, 1, 143--202.]]
[13]
Canetti, R. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science. 136--145.]]
[14]
Canetti, R., Ishai, Y., Kumar, R., Reiter, M., Rubinfeld, R., and Wright, R. 2001. Selective private function evaluation with applications to private statistics. In Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing. ACM Press, 293--304.]]
[15]
Chaum, D., Crépeau, C., and Damgård, I. 1988. Multiparty unconditionally secure protocols. In Proceedings of the 20th Annual ACM Symposium on the Theory of Computing. 11--19.]]
[16]
Chor, B., Goldreich, O., Kushilevitz, E., and Sudan, M. 1998. Private information retrieval. J. ACM 45, 965--981.]]
[17]
Cormode, G., Paterson, M., Sahinalp, S., and Vishkin, U. 2000. Communication complexity of document exchange. In the 11th Annual ACM/SIGACT-SIAM Symposium on Discrete Algorithms. 197--206.]]
[18]
DIMACS. Special year on massive data sets. 1997--1999. http://dimacs.rutgers.edu/SpecialYears/1997_1998/.]]
[19]
Dodis, Y., Reyzin, L., and Smith, A. 2004. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology (EUROCRYPT'04) Lecture Notes in Computer Science vol. 3027. Springer-Verlag, 523--540.]]
[20]
Even, S., Goldreich, O., and Lempel, A. 1985. A randomized protocol for signing contracts. Comm. ACM 28, 637--647.]]
[21]
Feder, T., Kushilevitz, E., Naor, M., and Nisan, N. 1995. Amortized communication complexity. SIAM J. Comput. 24, 4, 736--750.]]
[22]
Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M., and Wright, R. N. 2001. Secure multiparty computation of approximations. In Proceedings of the 28th International Colloquium on Automata, Languages and Programming. Springer-Verlag, 927--938.]]
[23]
Feigenbaum, J., Kannan, S., Strauss, M., and Viswanathan, M. 2002. An approximate L1-difference algorithm for massive data streams. SIAM J. Comput. 32, 1, 131--151.]]
[24]
Freedman, M., Nissim, K., and Pinkas, B. 2004. Efficient private matching and set intersection. In Advances in Cryptology (EUROCRYPT'04) Lecture Notes in Computer Science vol. 3027. Springer-Verlag, 1--19.]]
[25]
Gavinsky, D., Kempe, J., and de Wolf, R. 2004. Quantum communication cannot simulate a public coin. http://xxx.lanl.gov/abs/quant-ph/0411051.]]
[26]
Gentry, C., and Ramzan, Z. 2005. Single-database private information retrieval with constant communication rate. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming. 803--815.]]
[27]
Gertner, Y., Ishai, Y., Kushilevitz, E., and Malkin, T. 2000. Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sciences 60, 3, 592--692.]]
[28]
Goldreich, O. 2004. Foundations of Cryptography Volume II: Basic Applications. Cambridge University Press, Cambridge, UK.]]
[29]
Goldreich, O., Micali, S., and Wigderson, A. 1987. How to play any mental game. In Proceedings of the 19th Annual ACM Symposium on the Theory of Computing. ACM Press, 218--229.]]
[30]
Goldwasser, S., and Micali, S. 1984. Probabilistic encryption. J. Comput. Syst. Sciences 28, 270--299.]]
[31]
Halevi, S., Kushilevitz, E., Krauthgamer, R., and Nissim, K. 2001. Private approximations of NP-hard functions. In Proceedings of the 33th Annual ACM Symposium on the Theory of Computing. 550--559.]]
[32]
Indyk, P. 2000. Stable distributions, pseudorandom generators, embeddings and data stream computation. In Proceedings of the 41st IEEE Symposium on Foundations of Computer Science. 189--197.]]
[33]
Indyk, P., and Woodruff, D. P. 2006. Polylogarithmic private approximations and efficient matching. In Proceedings of the 3rd Theory of Cryptography Conference. 245--264.]]
[34]
Ishai, Y., Kushilevitz, E., Ostrovsky, R., and Sahai, A. 2004. Batch codes and their applications. In Proceedings of the 36th Annual ACM Symposium on the Theory of Computing. 262--272.]]
[35]
Jerrum, M. and Sinclair, A. 1989. Approximating the permanent. SIAM J. Comput. 18, 6, 1149--1178.]]
[36]
Jerrum, M., Sinclair, A., and Vigoda, E. 2004. A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries. J. ACM 51, 4, 671--697.]]
[37]
Jerrum, M., Valiant, L., and Vazirani, V. 1986. Random generation of combinatorial structures from a uniform distribution. Theoret. Comput. Science 43, 169--188.]]
[38]
Kaltofen, E. and Shoup, V. 1995. Subquadratic-time factoring of polynomials over finite fields. In Proceedings of the 27th Annual ACM Symposium on the Theory of Computing. 398--406.]]
[39]
Katz, J., Ostrovsky, R., and Smith, A. 2003. Round efficiency of multi-party computation with a dishonest majority. In Advances in Cryptology (EUROCRYPT'03) Lecture Notes in Computer Science vol. 2656. Springer-Verlag, 578--595.]]
[40]
Kushilevitz, E. and Nisan, N. 1997. Communication Complexity. Cambridge University Press, Cambridge, UK.]]
[41]
Kushilevitz, E. and Ostrovsky, R. 1997. Replication is NOT needed: SINGLE database, computationally-private information retrieval. In Proceedings of the 38th IEEE Symposium on Foundations of Computer Science. 364--373.]]
[42]
Kushilevitz, E., Ostrovsky, R., and Rabani, Y. 2000. Efficient search for approximate nearest neighbor in high dimensional spaces. SIAM J. Comput. 30, 2, 457--474.]]
[43]
Lindell, Y. 2003. Parallel coin-tossing and constant-round secure two-party computation. J. Cryptol. 16, 3, 143--184.]]
[44]
Lindell, Y., and Pinkas, B. 2002. Privacy preserving data mining. J. Cryptol. 15, 3, 177--206.]]
[45]
Lipmaa, H. 2005. An oblivious transfer protocol with log-squared communication. In Proceedings of the 8th Information Security Conference (ISC'05). J. Zhou and J. Lopez, Eds. Lecture Notes in Computer Science vol. 3650. Springer-Verlag, 314--328.]]
[46]
Mann, E. 1998. Private access to distributed information. M.S. thesis, Technion (Israel Institute of Technology), Haifa, Israel.]]
[47]
Micali, S., and Rogaway, P. 1991. Secure computation. In Advances in Cryptology (CRYPTO'91) Lecture Notes in Computer Science vol. 576. Springer-Verlag, 392--404.]]
[48]
Minc, H. 1982. Permanents. In Encyclopedia of Mathematics and its Applications, vol. 6. Addison-Wesley.]]
[49]
Naor, J., and Naor, M. 1993. Small-bias probability spaces: efficient constructions and applications. SIAM J. Comput. 22, 4, 838--856.]]
[50]
Naor, M., and Nissim, K. 2001. Communication preserving protocols for secure function evaluation. In Proceedings of the 33th Annual ACM Symposium on the Theory of Computing. 590--599.]]
[51]
Naor, M., and Pinkas, B. 2005. Computationally secure oblivious transfer. J. Cryptol. 18, 1, 1--35.]]
[52]
Pass, R. 2004. Bounded-concurrent secure multi-party computation with a dishonest majority. In Proceedings of the 36th Annual ACM Symposium on the Theory of Computing. 232--241.]]
[53]
Rabin, M. O. 1981. How to exchange secrets by oblivious transfer. Tech. rep. TR-81, Aiken Computation Laboratory, Harvard University, Cambridge, MA.]]
[54]
Stern, J. P. 1998. A new and efficient all-or-nothing disclosure of secrets protocol. In Advances in Cryptology (ASIACRYPT'98) Lecture Notes in Computer Science vol. 1514. Springer-Verlag, 357--371.]]
[55]
Yao, A. 1982. Protocols for secure computation. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science. 160--164.]]
[56]
Yao, A. 2003. On the power of quantum fingerprinting. In Proceedings of the 35th Annual ACM Symposium on the Theory of Computing. 77--81.]]

Cited By

View all

Index Terms

  1. Secure multiparty computation of approximations

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Algorithms
    ACM Transactions on Algorithms  Volume 2, Issue 3
    July 2006
    193 pages
    ISSN:1549-6325
    EISSN:1549-6333
    DOI:10.1145/1159892
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 July 2006
    Published in TALG Volume 2, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Privacy
    2. distributed data processing
    3. sublinear communication

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)26
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Semi-Private Computation of Data Similarity With Applications to Data Valuation and PricingIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.325987918(1978-1988)Online publication date: 1-Jan-2023
    • (2023)Arithmetic SketchingAdvances in Cryptology – CRYPTO 202310.1007/978-3-031-38557-5_6(171-202)Online publication date: 20-Aug-2023
    • (2022)Secure Sampling with Sublinear CommunicationTheory of Cryptography10.1007/978-3-031-22365-5_13(348-377)Online publication date: 7-Nov-2022
    • (2021)Private Hierarchical Clustering and Efficient ApproximationProceedings of the 2021 on Cloud Computing Security Workshop10.1145/3474123.3486760(3-20)Online publication date: 15-Nov-2021
    • (2021)Modern Privacy-Preserving Record Linkage Techniques: An OverviewIEEE Transactions on Information Forensics and Security10.1109/TIFS.2021.311402616(4966-4987)Online publication date: 2021
    • (2020)Differentially-Private Multi-Party Sketching for Large-Scale StatisticsProceedings on Privacy Enhancing Technologies10.2478/popets-2020-00472020:3(153-174)Online publication date: 17-Aug-2020
    • (2019)The Case of Adversarial Inputs for Secure Similarity Approximation Protocols2019 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2019.00027(247-262)Online publication date: Jun-2019
    • (2019)Quantum sketching protocols for Hamming distance and beyondPhysical Review A10.1103/PhysRevA.99.06233199:6Online publication date: 24-Jun-2019
    • (2018)Differentially Private Distributed Online LearningIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2018.279438430:8(1440-1453)Online publication date: 1-Aug-2018
    • (2018)Zero-Knowledge Protocols for Search ProblemsSecurity and Cryptography for Networks10.1007/978-3-319-98113-0_16(292-309)Online publication date: 5-Sep-2018
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media