Secure computation of functionalities based on Hamming distance and its application to computing document similarity
نویسندگان
چکیده
This paper examines secure two-party computation of functions which depend only on the Hammingdistance of the inputs of the two parties. We present efficient protocols for computing these functions.In particular, we present protocols which are secure in the sense of full simulatability against maliciousadversaries.We then show applications of HDOT. These include protocols for checking similarity between docu-ments without disclosing additional information about them (these protocols are based on algorithms ofBroder et. al. for computing document similarity based on the Jaccard measure). Another application isa variant of symmetric private information retrieval (SPIR), which can be used if the server’s databasecontains N entries, at most N/ logN of which have individual values, and the rest are set to some defaultvalue. The receiver does not learn whether it receives an individual value or the default value. Thisvariant of PIR is unique since it can be based on the existence of OT alone.
منابع مشابه
A Novel Trust Computation Method Based on User Ratings to Improve the Recommendation
Today, the trust has turned into one of the most beneficial solutions to improve recommender systems, especially in the collaborative filtering method. However, trust statements suffer from a number of shortcomings, including the trust statements sparsity, users' inability to express explicit trust for other users in most of the existing applications, etc. Thus to overcome these problems, this ...
متن کاملInference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification
Similarity search is essential to many important applications and often involves searching at scale on high-dimensional data based on their similarity to a query. In biometric applications, recent vulnerability studies have shown that adversarial machine learning can compromise biometric recognition systems by exploiting the biometric similarity information. Existing methods for biometric priva...
متن کاملSecure Hamming Distance Based Computation and Its Applications
This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols for computing these functions. In particular, we present protocols which are secure in the sense of full simulatability against malicious adversaries. We show different applications of this family of functions, including a proto...
متن کاملSHADE: Secure HAmming DistancE Computation from Oblivious Transfer
We introduce two new schemes for securely computing Hamming distance in the two-party setting. Our first scheme is a very efficient protocol, based solely on 1-out-of-2 Oblivious Transfer, that achieves full security in the semi-honest setting and one-sided security in the malicious setting. Moreover we show that this protocol is significantly more efficient than the previous proposals, that ar...
متن کاملAn Empirical Comparison of Distance Measures for Multivariate Time Series Clustering
Multivariate time series (MTS) data are ubiquitous in science and daily life, and how to measure their similarity is a core part of MTS analyzing process. Many of the research efforts in this context have focused on proposing novel similarity measures for the underlying data. However, with the countless techniques to estimate similarity between MTS, this field suffers from a lack of comparative...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJACT
دوره 3 شماره
صفحات -
تاریخ انتشار 2013