Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank
نویسندگان
چکیده
Iterative methods are a standard technique in many areas of scientific computing. The key idea is that function applied repeatedly until the resulting sequence converges to correct answer. When applying such secure computation methodology (for example using MPC, FHE, or SGX) one either needs perform enough steps ensure convergence irrespective input data, test within algorithm, and this itself leads leakage data. Using Banach Fixed Point theorem, its extensions, we show data-leakage can be quantified. We then apply (via MPC) implementation PageRank methodology. For allowing small amount produces much more efficient implementation, for underlying graphs ‘leakage’ already known any attacker.
منابع مشابه
An efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملAn Improved Fast and Secure Hash Algorithm
Recently, a fast and secure hash function SFHA – 256 has been proposed and claimed as more secure and as having a better performance than the SHA – 256. In this paper an improved version of SFHA – 256 is proposed and analyzed using two parameters, namely the avalanche effect and uniform deviation. The experimental results and further analysis ensures the performance of the newly proposed and im...
متن کاملTested Evaluation of Fast and Secure Handover in FMIPv6
In next generation all-IP based networks, a large number of mobile nodes are expected to use MIPv6 protocol for mobility. In mobile environment one frequent cause of service disruption is handovers. When MN moves, at some point MN will reach the physical border of its current wireless network and will enter an area covered by another wireless network. In such a situation, MN must switch to the ...
متن کاملAn evaluation of recent secure deduplication proposals
Deduplication is widely used by cloud storage providers to cut costs, by storing and uploading a single instance of identical files shared across multiple user accounts. However, cross-account deduplication introduces several new side-channel attacks on user privacy; see e.g., Harnik et al. (IEEE Security and Privacy Magazine, 2010), Mulazzani et al. (USENIX Security, 2011). As a response, seve...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-75539-3_1