Privacy Preserving $n$-Party Scalar Product Protocol

نویسندگان

چکیده

Privacy-preserving machine learning enables the training of models on decentralized datasets without need to reveal data, both horizontal and vertically partitioned data. However, it relies specialized techniques algorithms perform necessary computations. The privacy preserving scalar product protocol, which dot vectors revealing them, is one popular example for its versatility. Unfortunately, solutions currently proposed in literature focus mainly two-party scenarios, even though scenarios with a higher number data parties are becoming more relevant. For when performing analyses that require counting samples fulfill certain criteria defined across various sites, such as calculating information gain at node decision tree. In this paper we propose generalization protocol an arbitrary parties, based existing method. Our solution recursive resolution smaller products. After describing our method, discuss potential scalability issues. Finally, describe guarantees identify any concerns, well comparing method original aspect.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Efficient Privacy-Preserving Scalar Product Protocol

Recently, privacy issues have become important in data analysis, especially when data is horizontally partitioned over several parties. In data mining, the data is typically represented as attribute-vectors and, for many applications, the scalar (dot) product is one of the fundamental operations that is repeatedly used. In privacy-preserving data mining, data is distributed across several parti...

متن کامل

Experimental analysis of a privacy-preserving scalar product protocol

The recent investigation of privacy-preserving data mining has been motivated by the growing concern about the privacy of individuals when their data is stored, aggregated, and mined for information. In an effort towards practical algorithms for privacy-preserving data mining solutions, we analyze and implement solutions to an important primitive: the privacy-preserving scalar product of two ve...

متن کامل

Efficient scalar product protocol and its privacy-preserving application

Scalar product protocol aims at securely computing the dot product of two private vectors. As a basic tool, the protocol has been widely used in privacy preserving distributed collaborative computations. In this paper, at the expense of disclosing partial sum of some private data, we propose a linearly efficient even-dimension scalar product protocol (EDSPP) without employing expensive homomorp...

متن کامل

Privacy-preserving Two-party Rational Set Intersection Protocol

Privacy-preserving data mining has been an active research area in recent years due to privacy concerns in many distributed data mining settings. Protocols for privacy-preserving data mining have considered semi-honest, malicious, and covert adversarial models in cryptographic settings, whereby an adversary is assumed to follow, arbitrarily deviate from the protocol, or behaving somewhere in be...

متن کامل

Third Party Privacy Preserving Protocol for Secure Web Services

Web services is become major issue in distributed data mining. In the literature we can found a number of proposals of privacy preserving which can be divided into two major categories that is trusted third party and multiparty based privacy protocols. In case of the trusted third party privacy protocol models the conventional asymmetric cryptographic based techniques or algorithms will be used...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Parallel and Distributed Systems

سال: 2023

ISSN: ['1045-9219', '1558-2183', '2161-9883']

DOI: https://doi.org/10.1109/tpds.2023.3238768