Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
スポンサーリンク
概要
- 論文の詳細を見る
Finding rare cases with medical data is important when hospitals or research institutes want to identify rare diseases. To extract meaningful information from a large amount of sensitive medical data, privacy-preserving data mining techniques can be used. A privacy-preserving t-repetition protocol can be used to find rare cases with distributed medical data. A privacy-preserving t-repetition protocol is to find elements which exactly t parties out of n parties have in common in their datasets without revealing their private datasets. A privacy-preserving t-repetition protocol can be used to find not only common cases with a high t but also rare cases with a low t. In 2011, Chun et al. suggested the generic set operation protocol which can be used to find t-repeated elements. In the paper, we first show that the Chun et al.'s protocol becomes infeasible for calculating t-repeated elements if the number of users is getting bigger. That is, the computational and communicational complexities of the Chun et al.'s protocol in calculating t-repeated elements grow exponentially as the number of users grows. Then, we suggest a polynomial-time protocol with respect to the number of users, which calculates t-repeated elements between users.
著者
-
Chun Ji
Graduate School of Information Management & Security, CIST, Korea University
-
Lee Dong
Graduate School Of Information & Communication Ajou University
-
JEONG Ik
Graduate School of Information Management & Security, CIST, Korea University
-
HONG Dowon
Department of Applied Mathematics, Kongju National University
-
JEONG Ik
Graduate School of Information Security, CIST, Korea University
関連論文
- RFID tag search protocol preserving privacy of mobile reader holders
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
- Stronger Chikazawa-Yamagishi ID-Based Key Distribution
- Searchable Encryption with Keyword-Recoverability
- SSR (Smart Sleep Recognizer): Making Decision Based on Probability of User's Intension (日韓合同ワークショップ 1st Korea-Japan Joint Workshop on Ubiquitous Computing and Networking Systems (ubiCNS 2005))
- Change of Rotated Cube Texture through Multi-processing in 3% Si-steels
- Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
- Analysis of Revocable-iff-Linked Ring Signature Scheme
- Strong ID-Based Key Distribution
- Three-Round Smart Card-Based Key Exchange Scheme(Fundamental Theories for Communications)
- On the Strong Forward Secrecy of the Improved Chikazawa-Yamagishi ID-Based Key Sharing(Information Security)
- Ultimate Longitudinal Strength-Based Safety and Reliability Assessment of a Ship′s Hull Girder〔付 討論〕
- Incompletely Condensed Silsesquioxanes : Formation and Reactivity
- A Hidden Vector Encryption Scheme with Constant-Size Tokens and Pairing Computations
- Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data
- Fast Bit-Parallel Polynomial Basis Multiplier for GF(2m) Defined by Pentanomials Using Weakly Dual Basis
- Transmission-Efficient Broadcast Encryption Scheme with Personalized Messages
- Bit-Parallel Cubing Computation over GF(3m) for Irreducible Trinomials