TY - GEN
T1 - Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
AU - Morita, Hiraku
AU - Attrapadung, Nuttapong
AU - Ohata, Satsuya
AU - Nuida, Koji
AU - Yamada, Shota
AU - Shimizu, Kana
AU - Hanaoka, Goichiro
AU - Asai, Kiyoshi
N1 - Publisher Copyright:
© 2018 IEICE.
PY - 2018/7/2
Y1 - 2018/7/2
N2 - We present a new secure integer division protocol with private divisor. Our protocol is based loosely on the Bogdanov et al. (Int. J. Inf. Secur.'12) protocol, which securely computes the classical Goldschmidt's division algorithm. While the Bogdanov et al. scheme was designed specifically to work only on a 3-out-of-3 secret sharing scheme, our scheme works on a 2-out-of-2 secret sharing scheme. This has an advantage since the latter setting is more widely used in the literature of secure computation, and our protocol can thus be used as an efficient building block in this setting. We implement our protocol in Python and provide its benchmark.As a main application of our division protocol, we implement a secure protocol for privacy-preserving chi-squared tests on genomic data. This demonstrates that the proposed protocol is suitable for the statistical analysis on sensitive data.
AB - We present a new secure integer division protocol with private divisor. Our protocol is based loosely on the Bogdanov et al. (Int. J. Inf. Secur.'12) protocol, which securely computes the classical Goldschmidt's division algorithm. While the Bogdanov et al. scheme was designed specifically to work only on a 3-out-of-3 secret sharing scheme, our scheme works on a 2-out-of-2 secret sharing scheme. This has an advantage since the latter setting is more widely used in the literature of secure computation, and our protocol can thus be used as an efficient building block in this setting. We implement our protocol in Python and provide its benchmark.As a main application of our division protocol, we implement a secure protocol for privacy-preserving chi-squared tests on genomic data. This demonstrates that the proposed protocol is suitable for the statistical analysis on sensitive data.
UR - http://www.scopus.com/inward/record.url?scp=85063877946&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85063877946&partnerID=8YFLogxK
U2 - 10.23919/ISITA.2018.8664337
DO - 10.23919/ISITA.2018.8664337
M3 - Conference contribution
AN - SCOPUS:85063877946
T3 - Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018
SP - 530
EP - 534
BT - Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 15th International Symposium on Information Theory and Its Applications, ISITA 2018
Y2 - 28 October 2018 through 31 October 2018
ER -