Paper 2015/817

Secure Multiparty Computation of a Social Network

Varsha Bhat Kukkala, Jaspal Singh Saini, and S. R. S. Iyengar

Abstract

The society today is better connected as a result of advancement in technology. The study of these social interactions and its resulting structure, is an integral component in the field of network science. However, the study of these social networks is limited to the availability of data. Privacy concerns restrict the access to network data with sensitive information. Networks that capture the relations such as trust, enmity, sexual contact, are a few examples of sensitive networks. A study of these sensitive networks is important in unraveling the behavioral aspects of the concerned individuals. The current paper proposes a multiparty computation algorithm that allows the construction of the unlabeled isomorphic version of the underlying network. The algorithm is information theoretic secure and works under the malicious adversarial model with the threshold of one third total corrupt parties.

Note: Changes to the previously proposed protocol are incorporated with better thresholds

Metadata
Available format(s)
PDF
Publication info
Preprint. MAJOR revision.
Keywords
Multiparty computationSocial networksInformation theoretic
Contact author(s)
varsha bhat @ iitrpr ac in
History
2016-05-30: last of 4 revisions
2015-08-18: received
See all versions
Short URL
https://ia.cr/2015/817
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/817,
      author = {Varsha Bhat Kukkala and Jaspal Singh Saini and S. R. S.  Iyengar},
      title = {Secure Multiparty Computation of a Social Network},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/817},
      year = {2015},
      url = {https://eprint.iacr.org/2015/817}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.