Private graph intersection protocol

9Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A wide range of applications can benefit from storing and managing data as graph structures, and graph theory algorithms can be used to solve various computing problems. In this paper, we propose a secure two-party private graph intersection protocol against semi-honest servers. The protocol allows a server and a client, each holding a private graph, to jointly compute the intersection of their graphs. The protocol utilizes homomorphic encryptions and a private set intersection sub-protocol to prevent information leakage during the process. At the end of the protocol, the server learns the graph intersection, and the client learns the vertex intersection.

Cite

CITATION STYLE

APA

Zhou, F., Xu, Z., Li, Y., Xu, J., & Peng, S. (2017). Private graph intersection protocol. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10343 LNCS, pp. 235–248). Springer Verlag. https://doi.org/10.1007/978-3-319-59870-3_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free