Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank

نویسندگان

چکیده

Iterative methods are a standard technique in many areas of scientific computing. The key idea is that function applied repeatedly until the resulting sequence converges to correct answer. When applying such secure computation methodology (for example using MPC, FHE, or SGX) one either needs perform enough steps ensure convergence irrespective input data, test within algorithm, and this itself leads leakage data. Using Banach Fixed Point theorem, its extensions, we show data-leakage can be quantified. We then apply (via MPC) implementation PageRank methodology. For allowing small amount produces much more efficient implementation, for underlying graphs ‘leakage’ already known any attacker.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Secure Virtualization with Formal Methods

Secure Virtualization with Formal Methods

متن کامل

An Improved Fast and Secure Hash Algorithm

Recently, a fast and secure hash function SFHA – 256 has been proposed and claimed as more secure and as having a better performance than the SHA – 256. In this paper an improved version of SFHA – 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis ensures the performance of the newly proposed and im...

متن کامل

Tested Evaluation of Fast and Secure Handover in FMIPv6

In next generation all-IP based networks, a large number of mobile nodes are expected to use MIPv6 protocol for mobility. In mobile environment one frequent cause of service disruption is handovers. When MN moves, at some point MN will reach the physical border of its current wireless network and will enter an area covered by another wireless network. In such a situation, MN must switch to the ...

متن کامل

An evaluation of recent secure deduplication proposals

Deduplication is widely used by cloud storage providers to cut costs, by storing and uploading a single instance of identical files shared across multiple user accounts. However, cross-account deduplication introduces several new side-channel attacks on user privacy; see e.g., Harnik et al. (IEEE Security and Privacy Magazine, 2010), Mulazzani et al. (USENIX Security, 2011). As a response, seve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-75539-3_1