4.4 Article

Kth min Threshold Encryption for Privacy-preserving Data Evaluation

期刊

COMPUTER JOURNAL
卷 -, 期 -, 页码 -

出版社

OXFORD UNIV PRESS
DOI: 10.1093/comjnl/bxad113

关键词

threshold encryption; the kth smallest element; data evaluation; public-key setting

向作者/读者索取更多资源

The kth min threshold is a fundamental operation in data evaluation that determines whether the kth smallest element in an attribute set exceeds a predefined threshold. However, conducting such evaluations compromises the privacy of confidential files due to the sensitive information involved. In this research, a new encryption notion called kth min threshold encryption (KTE) is proposed to preserve the privacy of confidential files during data evaluation. The construction of KTE in the public-key setting ensures optimally short private keys, making it practical with only two pairing operations for decryption computation.
The $k$th min threshold is to judge whether the $k$th smallest element of an attribute set along with a confidential file is greater than a predefined threshold, which is a fundamental, primitive operation in data evaluation, such as risk evaluation in business investment. However, it will compromise the privacy of the confidential files when proceeding with such a data evaluation because there is often a large amount of sensitive information involved in them, which the organizations/individuals are reluctant to expose due to the risk of losing a competitive advantage. Motivated by the issue how to preserve the privacy of the confidential files during data evaluation, in this research, we first present a new encryption notion called $k$th min threshold encryption (KTE) for serving privacy-preserving data evaluation. In this notion, the confidential file will be encrypted under an attribute set for its privacy protection prior to being sent to a receiver, and a decryption key is generated from a threshold $d$ and a rank $k$ of element, both selected by the receiver. The decryption will be successful if and only if the $k$th smallest element of the attribute set is greater than $d$. We then describe a concrete construction of KTE in the public-key setting. In particular, our construction features optimally short private keys, which only consists of one group element. By virtue of this advantage, it is quite practical because of only two pairing operations for decryption computation.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.4
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据