Privacy-Preserving Equality Test
نویسندگان
چکیده
Many countries around the globe are investing on e-healthcare increasingly, which offers tremendous benefits to all stakeholders in healthcare. Nevertheless, this technology introduces unprecedented privacy concerns toward patients and raise more uncertainty among them to use e-healthcare for monitoring their vital signs. These concerns necessitate finding scientific solutions, which enable e-healthcare systems to process and analyze privacy-sensitive information, and offer services to the patients without violating their privacy. One of the approaches to address the privacy concerns is utilizing cryptographic techniques, which provide us tools to create Privacy-by-Design e-healthcare systems. Moreover, cryptographic solutions allow to process patients’ private information, while they are kept confidential and only known to the patients. Although using cryptographic technique is effective in providing privacy and processing private information, it results in high computational and communicational overhead. In fact, the current cryptographic building-blocks are not efficient enough for processing encrypted data in large-scale databases. In this paper, we address one of the highly used cryptographic building-blocks, which is checking the equality of two encrypted values. We investigate through the performance of the state-of-the-art secure equality tests and propose novel techniques to reduce their costs in terms of computation and communication. Then, through the complexity analysis and experimental results, we show 99% improvements in terms of computation is achieved. These improvements make the e-healthcare systems more attractive in terms of efficiency and in reach of practical applicability.
منابع مشابه
Zero-knowledge Test of Vector Equivalence and Granulation of User Data with Privacy
This paper introduces a new framework for privacy preserving computation to the granular computing community. The framework is called P4P (Peers for Privacy) and features a unique architecture and practical protocols for user data validation and vector addition-based computation. It turned out that many non-trivial and non-linear computations can be done using an iterative algorithm with vector...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملTowards Secure and Practical Location Privacy through Private Equality Testing
We propose a practical, privacy-preserving equality testing protocol which allows two users to learn if they share the same encrypted input data. Our protocol assumes no trust on third parties and/or other peers, and it is suited for low-min entropy data (i.e., which can be exhaustively searched by an attacker), such as encrypted users locations. Our primitive is secure and efficient: Two publi...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملPrivacy-Preserving Equality Test Towards Big Data
In this paper, we review the problem of private batch equality test (PriBET) that was proposed by Saha and Koshiba (3rd APWConCSE 2016). They described this problem to find the equality of an integer within a set of integers between two parties who do not want to reveal their information if they do not equal. For this purpose, they proposed the PriBET protocol along with a packing method using ...
متن کامل