TY - GEN
T1 - Toward secure clustered multi-party computation
T2 - International Conference on Information and Communication Technology, ICT-EurAsia 2013
AU - Abbasi, Sedigheh
AU - Cimato, Stelvio
AU - Damiani, Ernesto
PY - 2013
Y1 - 2013
N2 - Despite a large amount of research work has been done and a large number of results produced, the deployment of Secure Multi-party Computation (SMC) protocols for solving practical problems in real world scenarios is still an issue. This is mainly due to the complexity of the SMC-based solutions and to the needed assumptions that are not easy to fit to the considered problem. In this paper we propose an innovative approach for the deployment of SMC, providing a tradeoff between efficiency and privacy. In the Secure Clustered Multi-Party Computation (SCMC) approach, a function is more efficiently computed through reducing the number of participants to the SMC protocol by clustering, such that a reasonable privacy leakage inside the cluster is allowed. Toward this direction, this paper verifies the impact and the feasibility of applying different clustering techniques over the participants to a SMC protocol and proposes an effective specifically-tailored clustering protocol.
AB - Despite a large amount of research work has been done and a large number of results produced, the deployment of Secure Multi-party Computation (SMC) protocols for solving practical problems in real world scenarios is still an issue. This is mainly due to the complexity of the SMC-based solutions and to the needed assumptions that are not easy to fit to the considered problem. In this paper we propose an innovative approach for the deployment of SMC, providing a tradeoff between efficiency and privacy. In the Secure Clustered Multi-Party Computation (SCMC) approach, a function is more efficiently computed through reducing the number of participants to the SMC protocol by clustering, such that a reasonable privacy leakage inside the cluster is allowed. Toward this direction, this paper verifies the impact and the feasibility of applying different clustering techniques over the participants to a SMC protocol and proposes an effective specifically-tailored clustering protocol.
KW - Privacy and Efficiency Tradeoff
KW - Privacy-Preserving Clustering
KW - Secure Multi-Party Computation
UR - http://www.scopus.com/inward/record.url?scp=84875158205&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-36818-9_49
DO - 10.1007/978-3-642-36818-9_49
M3 - Conference contribution
AN - SCOPUS:84875158205
SN - 9783642368172
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 447
EP - 452
BT - Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings
Y2 - 25 March 2013 through 29 March 2013
ER -