Design and implementation of privacy-preserving reconciliation protocols

Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Privacy-preserving reconciliation protocols on ordered sets are protocols that solve a particular subproblem of secure multiparty computation. Here, each party holds a private input set of equal size in which the elements are ordered according to the party's preferences. The goal of a reconciliation protocol on these ordered sets is then to find all common elements in the parties' input sets that maximize the joint preferences of the parties. In this paper, we present two main contributions that improve on the current state of the art. First, we propose two new protocols for privacy-preserving reconciliation and prove their correctness and security properties. We implement and evaluate our protocols as well as two previously published multi-party reconciliation protocols. Our implementation is the first practical solution to reconciliation problems in the multi-party setting. Our comparison shows that our new protocols outperform the original protocols. The basic optimization idea is to reduce the highest degree polynomial in the protocol design. Second, we generalize privacy-preserving reconciliation protocols, i. e., relaxing the input constraint from totally ordered input sets of equal size to pre-ordered input sets of arbitrary size.

Original languageEnglish
Title of host publicationJoint EDBT/ICDT 2013 Workshops - Proceedings
Pages121-130
Number of pages10
DOIs
StatePublished - 2013
EventJoint EDBT/ICDT 2013 Workshops - Genoa, Italy
Duration: 18 Mar 201322 Mar 2013

Publication series

NameACM International Conference Proceeding Series

Conference

ConferenceJoint EDBT/ICDT 2013 Workshops
Country/TerritoryItaly
CityGenoa
Period18/03/1322/03/13

Keywords

  • privacy
  • secure multi-party computation

Fingerprint

Dive into the research topics of 'Design and implementation of privacy-preserving reconciliation protocols'. Together they form a unique fingerprint.

Cite this