Scalar Product Lattice Computation for Efficient Privacy-preserving Systems

Privacy-preserving applications allow users to perform on-line daily actions without leaking sensitive information. Privacy-preserving scalar product is one of the critical algorithms in many private applications. The state-of-the-art privacy-preserving scalar product schemes use either computationally intensive homomorphic (public-key) encryption techniques such as Paillier encryption to achieve strong security (i.e., 128-bit) or random masking technique to achieve high efficiency for low security. In this paper, lattice structures have been exploited to develop an efficient privacy-preserving system. The proposed scheme is not only efficient in computation as compared to the state-of-the-art but also provides high degree of security against quantum attacks. Rigorous security and privacy analyses of the proposed scheme have been provided along with a concrete set of parameters to achieve 128-bit and 256-bit security. Performance analysis shows that the scheme is at least five orders faster than the Paillier schemes and at least twice as faster than the existing randomisation technique at 128-bit security.

READ FULL TEXT

page 1

page 9

research
04/28/2020

Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks

Privacy preserving machine learning is an active area of research usuall...
research
06/11/2019

A Comment on Privacy-Preserving Scalar Product Protocols as proposed in "SPOC"

Privacy-preserving scalar product (PPSP) protocols are an important buil...
research
06/10/2020

Fast Privacy-Preserving Punch Cards

Loyalty programs in the form of punch cards that can be redeemed for ben...
research
02/25/2023

Privacy-Preserving Electricity Theft Detection based on Blockchain

In most electricity theft detection schemes, consumers' power consumptio...
research
04/07/2017

Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic Encryption

We propose a privacy-preserving framework for learning visual classifier...
research
03/13/2021

An Identity-based Batch Verification Scheme for VANETs Based on Ring Signature with Efficient Revocation

Vehicular ad-hoc networks (VANETs) are one of the most important compone...
research
10/11/2018

An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking (Long Version)

Benchmarking is an important measure for companies to investigate their ...

Please sign up or login with your details

Forgot password? Click here to reset