Privacy Assurances in Multiple Data-Aggregation Transactions

Kim LE, Parmesh Ramanathan, Kewal Saluja

Research output: A Conference proceeding or a Chapter in BookConference contribution

1 Citation (Scopus)

Abstract

In this paper, we propose a privacy-preserving algorithm for aggregating data in multiple transactions from a large number of users at a thirdparty application. The aggregation is performed using the most commonly used weighted sum function. The new algorithm has several novel features. First, we propose a method to generate a privacy-assurance certificate that can be easily verified by all users without significant computation effort. In particular, the computational complexity of verification does not grow with the number of users. Second, the proposed approach has a very desirable feature that users do not have to directly communicate with each other. Instead, they only communicate with the application. These features distinguish our approach from the existing research in literature.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2013
Subtitle of host publication16th International Conference Seoul, Korea, November 27–29, 2013 Revised Selected Papers
EditorsHyang-Sook Lee, Dong-Guk Han
Place of PublicationCham, Switzerland
PublisherSpringer
Pages3-19
Number of pages17
Volume8565
Edition1
ISBN (Electronic)9783319121598
ISBN (Print)9783319121598
DOIs
Publication statusPublished - 2014
EventInformation Security and Cryptology - ICISC 2013 - New Millennium Hall, Konkuk University, Korea, Republic of
Duration: 27 Nov 201329 Nov 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8565
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInformation Security and Cryptology - ICISC 2013
CountryKorea, Republic of
Period27/11/1329/11/13

Fingerprint Dive into the research topics of 'Privacy Assurances in Multiple Data-Aggregation Transactions'. Together they form a unique fingerprint.

  • Cite this

    LE, K., Ramanathan, P., & Saluja, K. (2014). Privacy Assurances in Multiple Data-Aggregation Transactions. In H-S. Lee, & D-G. Han (Eds.), Information Security and Cryptology - ICISC 2013: 16th International Conference Seoul, Korea, November 27–29, 2013 Revised Selected Papers (1 ed., Vol. 8565, pp. 3-19). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8565). Springer. https://doi.org/10.1007/978-3-319-12160-4_1