LiPISC: A lightweight and flexible method for privacy-aware intersection set computation

7Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

© 2016 Ren et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack).

Cite

CITATION STYLE

APA

Ren, W., Huang, S., Ren, Y., & Choo, K. K. R. (2016). LiPISC: A lightweight and flexible method for privacy-aware intersection set computation. PLoS ONE, 11(6). https://doi.org/10.1371/journal.pone.0157752

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free