Zero-knowledge Test of Vector Equivalence and Granulation of User Data with Privacy
نویسندگان
چکیده
This paper introduces a new framework for privacy preserving computation to the granular computing community. The framework is called P4P (Peers for Privacy) and features a unique architecture and practical protocols for user data validation and vector addition-based computation. It turned out that many non-trivial and non-linear computations can be done using an iterative algorithm with vector-addition aggregation steps. Examples include voting, summation, SVD, regression, and ANOVA etc. P4P allows them to be carried out while preserving users privacy. To demonstrate its application in granular computing, we present two practical protocols that test the equality of user vectors in zero-knowledge. Our protocols only involve constant number of public key operations (independent of vector size) and are very efficient. These protocols can be used to perform granulation, which is a fundamental task of granular computing, in a privacy-preserving manner. They can also be of independent interest for other fields such as data mining as well.
منابع مشابه
Automatic Interpretation of UltraCam Imagery by Combination of Support Vector Machine and Knowledge-based Systems
With the development of digital sensors, an increasing number of high-resolution images are available. Interpretation of these images is not possible manually, which necessitates seeking for practical, fast and automatic solutions to solve the environmental and location-based management problems. The land cover classification using high-resolution imagery is a difficult process because of the c...
متن کاملارزیابی کیفیت وب سایتهای فارسی حوزه افسردگی براساس مقیاس وب مد کوال
Introduction: Nowadays, anyone with any knowledge of the Internet environment can act as producer and distributer of information. It differs from most traditional media of information transmission, lack of information control and lack of quality management to contents. This leads to quality of health information on the internet is doubtful. The objective of this study is guidance patients to ...
متن کاملپروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملAn equivalence functor between local vector lattices and vector lattices
We call a local vector lattice any vector lattice with a distinguished positive strong unit and having exactly one maximal ideal (its radical). We provide a short study of local vector lattices. In this regards, some characterizations of local vector lattices are given. For instance, we prove that a vector lattice with a distinguished strong unit is local if and only if it is clean with non no-...
متن کاملDesign and Development of a Mobile-Based Application for Identification, Prevention, and Control of Head Lice and Survey of User Satisfaction
Introduction: Using mobile phones is one of the ways to increase peoplechr('39')s knowledge and awareness. The objective of this study was to design and develop a mobile-based application for “identification, prevention, and control of head lice” and also to assess the satisfaction of mobile users with this educational application. Method: This descriptive cross-sectional study was conducted in...
متن کامل