Privacy-Preserving Data Aggregation with Probabilistic Range Validation

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)
1050 Downloads (Pure)

Abstract

Privacy-preserving data aggregation protocols have been researched widely, but usually cannot guarantee correctness of the aggregate if users are malicious. These protocols can be extended with zero-knowledge proofs and commitments to work in the malicious model, but this incurs a significant computational cost on the end users, making adoption of these protocols less likely.

We propose a privacy-preserving data aggregation protocol for calculating the sum of user inputs. Our protocol gives the aggregator confidence that all inputs are within a desired range. Instead of zero-knowledge proofs, our protocol relies on a probabilistic hypergraph-based detection algorithm with which the aggregator can quickly pinpoint malicious users. Furthermore, our protocol is robust to user dropouts and, apart from the setup phase, it is non-interactive.
Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 19th International Conference, ACNS 2021, Proceedings
EditorsKazue Sako, Nils Ole Tippenhauer
Place of PublicationKamakura, Japan
PublisherSpringer Nature
Pages79-98
Number of pages20
Volume12727
Edition19
ISBN (Electronic)978-3-030-78375-4
ISBN (Print)978-3-030-78374-7
DOIs
Publication statusPublished - 2021

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12727 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Privacy
  • Data aggregation
  • Applied cryptography
  • Hypergraphs

Fingerprint

Dive into the research topics of 'Privacy-Preserving Data Aggregation with Probabilistic Range Validation'. Together they form a unique fingerprint.

Cite this