Paper 2015/817
Secure Multiparty Computation of a Social Network
Varsha Bhat Kukkala, Jaspal Singh Saini, and S. R. S. Iyengar
Abstract
The society today is better connected as a result of advancement in technology. The study of these social interactions and its resulting structure, is an integral component in the field of network science. However, the study of these social networks is limited to the availability of data. Privacy concerns restrict the access to network data with sensitive information. Networks that capture the relations such as trust, enmity, sexual contact, are a few examples of sensitive networks. A study of these sensitive networks is important in unraveling the behavioral aspects of the concerned individuals. The current paper proposes a multiparty computation algorithm that allows the construction of the unlabeled isomorphic version of the underlying network. The algorithm is information theoretic secure and works under the malicious adversarial model with the threshold of one third total corrupt parties.
Note: Changes to the previously proposed protocol are incorporated with better thresholds
Metadata
- Available format(s)
- Publication info
- Preprint. MAJOR revision.
- Keywords
- Multiparty computationSocial networksInformation theoretic
- Contact author(s)
- varsha bhat @ iitrpr ac in
- History
- 2016-05-30: last of 4 revisions
- 2015-08-18: received
- See all versions
- Short URL
- https://ia.cr/2015/817
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2015/817, author = {Varsha Bhat Kukkala and Jaspal Singh Saini and S. R. S. Iyengar}, title = {Secure Multiparty Computation of a Social Network}, howpublished = {Cryptology {ePrint} Archive, Paper 2015/817}, year = {2015}, url = {https://eprint.iacr.org/2015/817} }