Paper 2011/113

Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

Emiliano De Cristofaro, Yanbin Lu, and Gene Tsudik


The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. We consider two interacting parties, at least one of which seeks information from the other: the latter is either willing, or compelled, to share information. This poses two challenges: (1) how to enable this type of sharing such that parties learn no information beyond what they are entitled to, and (2) how to do so efficiently, in real-world practical terms. This paper explores the notion of Privacy-Preserving Sharing of Sensitive Information (PPSSI), and provides two concrete and efficient instantiations, modeled in the context of simple database querying. Proposed techniques function as a privacy shield to protect parties from disclosing more than the required minimum of their respective sensitive information. PPSSI deployment prompts several challenges, that are addressed in this paper. Extensive experimental results attest to the practicality of attained privacy features and show that they incur quite low overhead (e.g., $10\%$ slower than standard MySQL).

Note: A preliminary version of this report appears in the Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST 2011). Also, a shorter version is under revision in IEEE Transactions on Dependable and Secure Computing (TDSC).

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
cryptographic protocolspractical implementationssecure two-party computation
Contact author(s)
edecrist @ uci edu
2012-06-22: last of 4 revisions
2011-03-07: received
See all versions
Short URL
Creative Commons Attribution


      author = {Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik},
      title = {Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information},
      howpublished = {Cryptology ePrint Archive, Paper 2011/113},
      year = {2011},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.