Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/57299
Citations
Scopus Web of Science® Altmetric
?
?
Type: Journal article
Title: Privacy-preserving tuple matching in distributed databases
Author: Sang, Y.
Shen, H.
Tian, H.
Citation: IEEE Transactions on Knowledge and Data Engineering, 2009; 21(12):1767-1782
Publisher: IEEE Computer Soc
Issue Date: 2009
ISSN: 1041-4347
1558-2191
Statement of
Responsibility: 
Yingpeng Sang, Hong Shen, and Hui Tian
Abstract: We address the problems of Privacy-Preserving Duplicate Tuple Matching (PPDTM) and Privacy-Preserving Threshold Attributes Matching (PPTAM) in the scenario of a horizontally partitioned database among N parties, where each party holds a private share of the database’s tuples and all tuples have the same set of attributes. In PPDTM, each party determines whether its tuples have any duplicate on other parties’ private databases. In PPTAM, each party determines whether all attribute values of each tuple appear at least a threshold number of times in the attribute unions. We propose protocols for the two problems using additive homomorphic cryptosystem based on the subgroup membership assumption, e.g., Paillier’s and ElGamal’s schemes. By analysis on the total numbers of modular exponentiations, modular multiplications and communication bits, with a reduced computation cost which dominates the total cost, by trading off communication cost, our PPDTM protocol for the semihonest model is superior to the solution derivable from existing techniques in total cost. Our PPTAM protocol is superior in both computation and communication costs. The efficiency improvements are achieved mainly by using random numbers instead of random polynomials as existing techniques for perturbation, without causing successful attacks by polynomial interpolations. We also give detailed constructions on the required zeroknowledge proofs and extend our two protocols to the malicious model, which were previously unknown.
Keywords: Privacy preservation
distributed database
secure computation
zero-knowledge proof.
DOI: 10.1109/TKDE.2009.39
Published version: http://dx.doi.org/10.1109/tkde.2009.39
Appears in Collections:Aurora harvest
Computer Science publications

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.