4.6 Article

Over-threshold multi-party private set operation protocols for lightweight clients

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Privacy-preserving COVID-19 contact tracing solution based on blockchain

Momeng Liu et al.

Summary: The COVID-19 pandemic has raised the need for automated contact tracing apps. This study proposes an efficient privacy-preserving solution using blockchain technology, combining zero-knowledge proof with multi-signature aggregation. The solution saves storage and reduces computational cost while protecting user privacy.

COMPUTER STANDARDS & INTERFACES (2023)

Article Computer Science, Hardware & Architecture

Blockchain-based verifiable privacy-preserving data classification protocol for medical data

Xiaokun Zheng et al.

Summary: This paper focuses on the application of privacy-preserving data classification schemes in IoT devices and proposes a blockchain-based verifiable privacy-preserving data classification protocol. The protocol allows the data center to verify the classification result without involving an auditor, ensuring the transparency and security of data classification.

COMPUTER STANDARDS & INTERFACES (2022)

Article Computer Science, Artificial Intelligence

Secure approximate pattern matching protocol via Boolean threshold private set intersection

Xiaochao Wei et al.

Summary: This paper proposes a secure protocol for approximate pattern matching to address the privacy concerns in sharing genetic data. The authors first introduce the Boolean threshold private set intersection (BTPSI) functionality and develop a secure protocol for it. They then combine oblivious transfer with BTPSI in a semi-honest model to achieve an efficient construction of secure approximate pattern matching (SAPM) protocol. The performance experiment shows that the protocol has a low runtime when the length of the text and pattern are within certain ranges.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Server-aided multiparty private set intersection protocols for lightweight clients and the application in intelligent logistics

Ziyu Niu et al.

Summary: This paper proposes a novel server-aided multiparty PSI protocol, which transforms complex multiparty computation problems into efficient two-party computation problems, and designs protocols for calculating intersection element statistics. Experiments show that the protocol is highly efficient and suitable for lightweight clients.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Computer Science, Hardware & Architecture

PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks

Yu Chen et al.

Summary: This paper proposes a Privacy-Preserving Optimal Closeness Query (PP-OCQ) scheme which achieves secure optimal closeness query without revealing users' sensitive information by using encryption, signature and ElGamal Cryptography techniques. The proposed scheme is efficient in terms of computation cost and communication overhead, and controls data propagation direction to protect privacy and ensure security.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Hardware & Architecture

Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications

Can Zhang et al.

Summary: The current COVID-19 pandemic situation is seriously affecting daily work and life, calling for an effective contact tracing mechanism. To address privacy concerns, a Privacy-preserving contact Tracing scheme called PTBM utilizing 5G-integrated network and Blockchain-based Medical applications has been proposed, ensuring privacy protection, traceability, reliability, and authentication with high efficiency and low latency.

COMPUTER STANDARDS & INTERFACES (2021)

Article Computer Science, Hardware & Architecture

Efficient Delegated Private Set Intersection on Outsourced Private Datasets

Aydin Abadi et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Computer Science, Information Systems

Scalable Private Set Intersection Based on OT Extension

Benny Pinkas et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2018)

Article Computer Science, Hardware & Architecture

A two-party privacy preserving set intersection protocol against malicious users in cloud computing

Xuefei Cao et al.

COMPUTER STANDARDS & INTERFACES (2017)

Article Computer Science, Information Systems

Quantum private set intersection cardinality and its application to anonymous authentication

Run-hua Shi et al.

INFORMATION SCIENCES (2016)