TY - GEN
T1 - Design and implementation of privacy-preserving reconciliation protocols
AU - Neugebauer, Georg
AU - Brutschy, Lucas
AU - Meyer, Ulrike
AU - Wetzel, Susanne
PY - 2013
Y1 - 2013
N2 - Privacy-preserving reconciliation protocols on ordered sets are protocols that solve a particular subproblem of secure multiparty computation. Here, each party holds a private input set of equal size in which the elements are ordered according to the party's preferences. The goal of a reconciliation protocol on these ordered sets is then to find all common elements in the parties' input sets that maximize the joint preferences of the parties. In this paper, we present two main contributions that improve on the current state of the art. First, we propose two new protocols for privacy-preserving reconciliation and prove their correctness and security properties. We implement and evaluate our protocols as well as two previously published multi-party reconciliation protocols. Our implementation is the first practical solution to reconciliation problems in the multi-party setting. Our comparison shows that our new protocols outperform the original protocols. The basic optimization idea is to reduce the highest degree polynomial in the protocol design. Second, we generalize privacy-preserving reconciliation protocols, i. e., relaxing the input constraint from totally ordered input sets of equal size to pre-ordered input sets of arbitrary size.
AB - Privacy-preserving reconciliation protocols on ordered sets are protocols that solve a particular subproblem of secure multiparty computation. Here, each party holds a private input set of equal size in which the elements are ordered according to the party's preferences. The goal of a reconciliation protocol on these ordered sets is then to find all common elements in the parties' input sets that maximize the joint preferences of the parties. In this paper, we present two main contributions that improve on the current state of the art. First, we propose two new protocols for privacy-preserving reconciliation and prove their correctness and security properties. We implement and evaluate our protocols as well as two previously published multi-party reconciliation protocols. Our implementation is the first practical solution to reconciliation problems in the multi-party setting. Our comparison shows that our new protocols outperform the original protocols. The basic optimization idea is to reduce the highest degree polynomial in the protocol design. Second, we generalize privacy-preserving reconciliation protocols, i. e., relaxing the input constraint from totally ordered input sets of equal size to pre-ordered input sets of arbitrary size.
KW - privacy
KW - secure multi-party computation
UR - http://www.scopus.com/inward/record.url?scp=84876795934&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84876795934&partnerID=8YFLogxK
U2 - 10.1145/2457317.2457339
DO - 10.1145/2457317.2457339
M3 - Conference contribution
AN - SCOPUS:84876795934
SN - 9781450315999
T3 - ACM International Conference Proceeding Series
SP - 121
EP - 130
BT - Joint EDBT/ICDT 2013 Workshops - Proceedings
T2 - Joint EDBT/ICDT 2013 Workshops
Y2 - 18 March 2013 through 22 March 2013
ER -