51. Privacy-Preserving Graph Operations for Mobile Authentication
- Author
-
Jian Xu, Fucai Zhou, Yuxi Li, Peng Li, and Zifeng Xu
- Subjects
Technology ,Authentication ,Article Subject ,Computer Networks and Communications ,business.industry ,Computer science ,Homomorphic encryption ,020206 networking & telecommunications ,TK5101-6720 ,02 engineering and technology ,Mobile authentication ,Privacy preserving ,Information leakage ,Telecommunication ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,Graph operations ,Information Systems ,Computer network - Abstract
Along with the fast development of wireless technologies, smart devices have become an integral part of our daily life. Authentication is one of the most common and effective methods for these smart devices to prevent unauthorized access. Moreover, smart devices tend to have limited computing power, and they may possess sensitive data. In this paper, we investigate performing graph operations in a privacy-preserving manner, which can be used for anonymous authentication for smart devices. We propose two protocols that allow two parties to jointly compute the intersection and union of their private graphs. Our protocols utilize homomorphic encryption to prevent information leakage during the process, and we provide security proofs of the protocols in the semihonest setting. At last, we implement and evaluate the efficiency of our protocols through experiments on real-world graph data.
- Published
- 2020