CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
CERIAS Logo
Purdue University - Discovery Park
Center for Education and Research in Information Assurance and Security

Privacy-Preserving Cooperative Computations

Wenliang (Kevin) Du - CERIAS

Jan 31, 2001

Abstract

The Internet has triggered tremendous opportunities for cooperative computation, where people are cooperating with each other to conduct computation tasks based on the inputs they each supplies. These computations could occur between completely trusted partners, between partially trusted partners, or between mutually untrusted competitors. For example, customers might send to a remote database the queries that contain private information, two competing financial organizations might jointly invest in projects that must satisfy both organizations' private and valuable constraints, and so on. Usually, to conduct these computations, one must know inputs from all the participants; however if nobody can be trusted enough to know all the inputs, privacy will become a primary concern. Therefore, the problem is "how can multiple parties cooperatively conduct a computation without disclosing their private inputs to the other parties".

This problem is referred to as Secure Multi-party Computation Problem (SMC) in the literature, but the research in the SMC area has been focusing on only a limited set of problems. We have identified a number of new SMC problems for a spectrum of computation domains. In this talk, I will describe these new problems, including privacy-preserving database query, privacy-preserving data mining, privacy-preserving intrusion detection, privacy-preserving scientific computations, privacy-preserving statistical analysis, and privacy-preserving geometric computations. We will also discuss their potential applications. We have developed protocols to solve some of the above problems, although not all of them. I will present one to two of our protocols in this talk to demonstrate how this type of problem could be solved. Joint work with Professor Mikhail Atallah.

About the Speaker

Wenliang (Kevin) Du is a PH.D. student at CERIAS and Computer Science Department. He received his BS from the University of Science and Technology of China, his MS from Purdue University. He plans to defend his Ph.D. thesis this August.


Unless otherwise noted, the security seminar is held on Wednesdays at 4:30P.M. STEW G52, West Lafayette Campus. More information...

Disclaimer

The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.