TY - GEN
T1 - An efficient and probabilistic secure bit-decomposition
AU - Samanthula, Bharath K.K.
AU - Chun, Hu
AU - Jiang, Wei
PY - 2013
Y1 - 2013
N2 - Many secure data analysis tasks, such as secure clustering and classification, require efficient mechanisms to convert the intermediate encrypted integers into the corresponding encryptions of bits. The existing bit-decomposition algorithms either do not offer sufficient security or are computationally inefficient. In order to provide better security as well as to improve efficiency, we propose a novel probabilistic-based secure bit-decomposition protocol for values encrypted using public key additive homomorphic encryption schemes. The proposed protocol guarantees security as per the semi-honest security definition of secure multi-party computation (MPC) and is also very efficient compared to the existing method. Our protocol always returns the correct result, however, it is probabilistic in the sense that the correct result can be generated in the first run itself with very high probability. The computation time of the proposed protocol grows linearly with the input domain size in bits. We theoretically analyze the complexity of the proposed protocol with the existing method in detail.
AB - Many secure data analysis tasks, such as secure clustering and classification, require efficient mechanisms to convert the intermediate encrypted integers into the corresponding encryptions of bits. The existing bit-decomposition algorithms either do not offer sufficient security or are computationally inefficient. In order to provide better security as well as to improve efficiency, we propose a novel probabilistic-based secure bit-decomposition protocol for values encrypted using public key additive homomorphic encryption schemes. The proposed protocol guarantees security as per the semi-honest security definition of secure multi-party computation (MPC) and is also very efficient compared to the existing method. Our protocol always returns the correct result, however, it is probabilistic in the sense that the correct result can be generated in the first run itself with very high probability. The computation time of the proposed protocol grows linearly with the input domain size in bits. We theoretically analyze the complexity of the proposed protocol with the existing method in detail.
KW - bit-decomposition
KW - encryption
KW - security
UR - http://www.scopus.com/inward/record.url?scp=84877991754&partnerID=8YFLogxK
U2 - 10.1145/2484313.2484386
DO - 10.1145/2484313.2484386
M3 - Conference contribution
AN - SCOPUS:84877991754
SN - 9781450317672
T3 - ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
SP - 541
EP - 546
BT - ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
T2 - 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013
Y2 - 8 May 2013 through 10 May 2013
ER -