CPL - Chalmers Publication Library
| Utbildning | Forskning | Styrkeområden | Om Chalmers | In English In English Ej inloggad.

A Differentially Private Encryption Scheme

Carlo Brunetta (Institutionen för data- och informationsteknik, Nätverk och system (Chalmers) ) ; Christos Dimitrakakis (Institutionen för data- och informationsteknik, Datavetenskap (Chalmers)) ; Bei Liang (Institutionen för data- och informationsteknik, Nätverk och system (Chalmers) ) ; Aikaterini Mitrokotsa (Institutionen för data- och informationsteknik, Nätverk och system (Chalmers) )
Lecture Notes in Computer Science: 20th International Conference on Information Security, ISC 2017; Ho Chi Minh City; Viet Nam; 22 November 2017 through 24 November 2017 (03029743). Vol. 10599 LNCS (2017), p. 309-326.
[Konferensbidrag, refereegranskat]

Encrypting data with a semantically secure cryptosystem guarantees that nothing is learned about the plaintext from the ciphertext. However, querying a database about individuals or requesting for summary statistics can leak information. Differential privacy (DP) offers a formal framework to bound the amount of information that an adversary can discover from a database with private data, when statistical findings of the stored data are communicated to an untrusted party. Although both encryption schemes and differential private mechanisms can provide important privacy guarantees, when employed in isolation they do not guarantee full privacy-preservation. This paper investigates how to efficiently combine DP and an encryption scheme to prevent leakage of information. More precisely, we introduce and instantiate differentially private encryption schemes that provide both DP and confidentiality. Our contributions are five-fold, we: (i) define an encryption scheme that is not correct with some probability i.e., an -correct encryption scheme and we prove that it satisfies the DP definition; (ii) prove that combining DP and encryption, is equivalent to using an -correct encryption scheme and provide a construction to build one from the other; (iii) prove that an encryption scheme that belongs in the DP-then-Encrypt class is at least as computationally secure as the original base encryption scheme; (iv) provide an -correct encryption scheme that achieves both requirements (i.e., DP and confidentiality) and relies on Dijk et al.’s homomorphic encryption scheme (EUROCRYPT 2010); and (v) perform some statistical experiments on our encryption scheme in order to empirically check the correctness of the theoretical results.

Nyckelord: Differential privacy; Encryption; Homomorphic encryption



Denna post skapades 2017-12-15.
CPL Pubid: 253794

 

Läs direkt!


Länk till annan sajt (kan kräva inloggning)