A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
Title | A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations |
Publication Type | Journal Article |
Year of Publication | 2015 |
Authors | Veugen, T., de Haan, R., Cramer, R., Muller, F. |
Journal | Information Forensics and Security, IEEE Transactions on |
Volume | 10 |
Pagination | 445-457 |
Date Published | March |
ISSN | 1556-6013 |
Keywords | adversarial model, authentication, client-server systems, collaborative filtering, Computational modeling, computer network security, cryptographic protocols, cryptography, malicious model, noncolluding external servers, preprocessing, preprocessing phase, protocol specification, Protocols, recommender systems, secret sharing, secure multi-party computation, secure recommender system, Servers |
Abstract | We provide a generic framework that, with the help of a preprocessing phase that is independent of the inputs of the users, allows an arbitrary number of users to securely outsource a computation to two non-colluding external servers. Our approach is shown to be provably secure in an adversarial model where one of the servers may arbitrarily deviate from the protocol specification, as well as employ an arbitrary number of dummy users. We use these techniques to implement a secure recommender system based on collaborative filtering that becomes more secure, and significantly more efficient than previously known implementations of such systems, when the preprocessing efforts are excluded. We suggest different alternatives for preprocessing, and discuss their merits and demerits. |
DOI | 10.1109/TIFS.2014.2370255 |
Citation Key | 6955802 |
- noncolluding external servers
- Servers
- secure recommender system
- secure multi-party computation
- secret sharing
- recommender systems
- Protocols
- protocol specification
- preprocessing phase
- preprocessing
- adversarial model
- malicious model
- Cryptography
- Cryptographic Protocols
- computer network security
- Computational modeling
- collaborative filtering
- client-server systems
- authentication