TY - JOUR
T1 - Designing privacy-preserving interval operations based on homomorphic encryption and secret sharing techniques
AU - Wüller, Stefan
AU - Mayer, Daniel
AU - Förg, Fabian
AU - Schüppen, Samuel
AU - Assadsolimani, Benjamin
AU - Meyer, Ulrike
AU - Wetzel, Susanne
N1 - Publisher Copyright:
© 2017-IOS Press and the authors.
PY - 2017
Y1 - 2017
N2 - This paper introduces two-party protocols for various operations on two integer intervals that are privacy-preserving in the semi-honest model. Specifically, this work proposes new protocols for determining whether two intervals overlap; computing the boundaries and size of the overlap; and selecting a random sub-interval within the overlap. The protocols are presented both for homomorphic encryption and for secret sharing as basic secure multi-party computation techniques. Moreover, this paper presents a comprehensive performance evaluation of the newly-developed protocols.
AB - This paper introduces two-party protocols for various operations on two integer intervals that are privacy-preserving in the semi-honest model. Specifically, this work proposes new protocols for determining whether two intervals overlap; computing the boundaries and size of the overlap; and selecting a random sub-interval within the overlap. The protocols are presented both for homomorphic encryption and for secret sharing as basic secure multi-party computation techniques. Moreover, this paper presents a comprehensive performance evaluation of the newly-developed protocols.
KW - Privacy
KW - homomorphic encryption
KW - interval operations
KW - secret sharing
KW - secure multi-party computation
UR - http://www.scopus.com/inward/record.url?scp=85015736639&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85015736639&partnerID=8YFLogxK
U2 - 10.3233/JCS-16830
DO - 10.3233/JCS-16830
M3 - Article
AN - SCOPUS:85015736639
SN - 0926-227X
VL - 25
SP - 59
EP - 81
JO - Journal of Computer Security
JF - Journal of Computer Security
IS - 1
ER -