Privacy-Preserving Data Mining: A Game-theoretic Approach
スポンサーリンク
概要
- 論文の詳細を見る
Data and Applications Security and Privacy XXV, 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011Privacy-preserving data mining has been an active research area in recent years due to privacy concerns in many distributed data mining settings. Protocols for privacy-preserving data mining have considered semi-honest, malicious, and covert adversarial models in cryptographic settings, whereby an adversary is assumed to follow, arbitrarily deviate from the protocol, or behaving somewhere in between these two, respectively. Semi-honest model provides weak security requiring small amount of computation, on the other hand, malicious and covert models provide strong security requiring expensive computations like homomorphic encryptions. However, game theory allows us to design protocols where parties are neither honest nor malicious but are instead viewed as rational and are assumed (only) to act in their own self-interest. In this paper, we build efficient and secure set-intersection protocol in game-theoretic setting using cryptographic primitives. Our construction avoids the use of expensive tools like homomorphic encryption and oblivious transfer. We also show that our protocol satisfies computational versions of strict Nash equilibrium and stability with respect to trembles.
- 2011-06-29
論文 | ランダム
- フランス詩を読む--ボードレールからシュルレアリスムまで(第31回)マラルメ「パイプ」
- フランス詩を読む--ボードレールからシュルレアリスムまで(第30回)ランボー『夜明け』
- 120年前の"現代美術" (パリ,1874印象派誕生に立ち会う旅) -- (いざ勝負!印象派VSアカデミスム)
- いざ勝負!印象派VSアカデミスム (パリ,1874印象派誕生に立ち会う旅)
- 7-50 学習指導法の改善に関する一考察 (第6年次報告) : 学習の個性化を図る授業システムについて