Efficient Privacy-preserving Schemes for Dot-product Computation in Mobile Computing
Title | Efficient Privacy-preserving Schemes for Dot-product Computation in Mobile Computing |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Hu, Chunqiang, Li, Ruinian, Li, Wei, Yu, Jiguo, Tian, Zhi, Bie, Rongfang |
Conference Name | Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing |
Date Published | July 2016 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4346-6 |
Keywords | Ad hoc networks, blind signature, Data security, dot-product calculation, Human Behavior, manet privacy, privacy preservation, pubcrawl, Repudiation, Resiliency, Scalability |
Abstract | Many applications of mobile computing require the computation of dot-product of two vectors. For examples, the dot-product of an individual's genome data and the gene biomarkers of a health center can help detect diseases in m-Health, and that of the interests of two persons can facilitate friend discovery in mobile social networks. Nevertheless, exposing the inputs of dot-product computation discloses sensitive information about the two participants, leading to severe privacy violations. In this paper, we tackle the problem of privacy-preserving dot-product computation targeting mobile computing applications in which secure channels are hardly established, and the computational efficiency is highly desirable. We first propose two basic schemes and then present the corresponding advanced versions to improve efficiency and enhance privacy-protection strength. Furthermore, we theoretically prove that our proposed schemes can simultaneously achieve privacy-preservation, non-repudiation, and accountability. Our numerical results verify the performance of the proposed schemes in terms of communication and computational overheads. |
URL | https://dl.acm.org/doi/10.1145/2940343.2948717 |
DOI | 10.1145/2940343.2948717 |
Citation Key | hu_efficient_2016 |