Skip to main content
Top
Published in:
Cover of the book

2018 | OriginalPaper | Chapter

Faster Privacy-Preserving Location Proximity Schemes

Authors : Kimmo Järvinen, Ágnes Kiss, Thomas Schneider, Oleksandr Tkachenko, Zheng Yang

Published in: Cryptology and Network Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In the last decade, location information became easily obtainable using off-the-shelf mobile devices. This gave a momentum to developing Location Based Services (LBSs) such as location proximity detection, which can be used to find friends or taxis nearby. LBSs can, however, be easily misused to track users, which draws attention to the need of protecting privacy of these users.
In this work, we address this issue by designing, implementing, and evaluating multiple algorithms for Privacy-Preserving Location Proximity (PPLP) that are based on different secure computation protocols. Our PPLP protocols are well-suited for different scenarios: for saving bandwidth, energy/computational power, or for faster runtimes. Furthermore, our algorithms have runtimes of a few milliseconds to hundreds of milliseconds and bandwidth of hundreds of bytes to one megabyte. In addition, the computationally most expensive parts of the PPLP computation can be precomputed in our protocols, such that the input-dependent online phase runs in just a few milliseconds.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
6
In the near future, today’s 4G mobile networks will be replaced by 5G, which will significantly reduce the average network latency (average expected latency in 5G networks is around 1 ms [18]). Therefore, in low-latency 5G networks \(\mathsf {ABY_{AY}}\) will potentially be most efficient (see Sect. 5.2).
 
Literature
1.
go back to reference Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: CCS, pp. 535–548. ACM (2013) Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: CCS, pp. 535–548. ACM (2013)
3.
go back to reference Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS (1993)
4.
go back to reference Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)CrossRef Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422–426 (1970)CrossRef
5.
go back to reference Boyar, J., Peralta, R., Pochuev, D.: On the multiplicative complexity of boolean functions over the basis (\(\wedge \), \(\oplus \), 1). TCS 235(1), 43–57 (2000) Boyar, J., Peralta, R., Pochuev, D.: On the multiplicative complexity of boolean functions over the basis (\(\wedge \), \(\oplus \), 1). TCS 235(1), 43–57 (2000)
7.
go back to reference Damgard, I., Geisler, M., Kroigard, M.: A correction to ’efficient and secure comparison for on-line auctions’. IJACT 1(4), 323–324 (2009)MathSciNetCrossRef Damgard, I., Geisler, M., Kroigard, M.: A correction to ’efficient and secure comparison for on-line auctions’. IJACT 1(4), 323–324 (2009)MathSciNetCrossRef
8.
go back to reference Demmler, D., Schneider, T., Zohner, M.: ABY - a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015) Demmler, D., Schneider, T., Zohner, M.: ABY - a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)
9.
go back to reference ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: CRYPTO (1984) ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: CRYPTO (1984)
11.
go back to reference Finch, S.R.: Mathematical Constants, vol. 93. Cambridge University Press, Cambridge (2003)MATH Finch, S.R.: Mathematical Constants, vol. 93. Cambridge University Press, Cambridge (2003)MATH
12.
go back to reference Freni, D., Ruiz Vicente, C., Mascetti, S., Bettini, C., Jensen, C.S.: Preserving location and absence privacy in geo-social networks. In: CIKM (2010) Freni, D., Ruiz Vicente, C., Mascetti, S., Bettini, C., Jensen, C.S.: Preserving location and absence privacy in geo-social networks. In: CIKM (2010)
13.
go back to reference El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRef El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985)MathSciNetCrossRef
14.
go back to reference Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC (1987) Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC (1987)
16.
go back to reference Hallgren, P.A., Ochoa, M., Sabelfeld, A.: InnerCircle: a parallelizable decentralized privacy-preserving location proximity protocol. In: PST (2015) Hallgren, P.A., Ochoa, M., Sabelfeld, A.: InnerCircle: a parallelizable decentralized privacy-preserving location proximity protocol. In: PST (2015)
17.
go back to reference Hallgren, P.A., Orlandi, C., Sabelfeld, A.: PrivatePool: privacy-preserving ridesharing. In: CSF (2017) Hallgren, P.A., Orlandi, C., Sabelfeld, A.: PrivatePool: privacy-preserving ridesharing. In: CSF (2017)
18.
go back to reference Johansson, N.A., Wang, Y.-P.E., Eriksson, E., Hessler, M.: Radio access for ultra-reliable and low-latency 5G communications. In: ICC Workshop (2015) Johansson, N.A., Wang, Y.-P.E., Eriksson, E., Hessler, M.: Radio access for ultra-reliable and low-latency 5G communications. In: ICC Workshop (2015)
19.
go back to reference Järvinen, K., Kiss, A., Schneider, T., Tkachenko, O., Yang, Z.: Faster privacy-preserving location proximity schemes. Cryptology ePrint Archive, Report 2018/694 (2018). http://ia.cr/2018/694 Järvinen, K., Kiss, A., Schneider, T., Tkachenko, O., Yang, Z.: Faster privacy-preserving location proximity schemes. Cryptology ePrint Archive, Report 2018/694 (2018). http://​ia.​cr/​2018/​694
22.
go back to reference Li, M., Ruan, N., Qian, Q., Zhu, H., Liang, X., Yu, L.: SPFM: scalable and privacy-preserving friend matching in mobile cloud. IEEE IoT J. 4(2), 583–591 (2017) Li, M., Ruan, N., Qian, Q., Zhu, H., Liang, X., Yu, L.: SPFM: scalable and privacy-preserving friend matching in mobile cloud. IEEE IoT J. 4(2), 583–591 (2017)
23.
go back to reference Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRef Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRef
24.
go back to reference Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA, pp. 448–457. ACM/SIAM (2001) Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA, pp. 448–457. ACM/SIAM (2001)
25.
go back to reference Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: NDSS (2011) Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: NDSS (2011)
26.
go back to reference Pagh, A., Pagh, R., Rao, S.S.: An optimal bloom filter replacement. In: SODA (2005) Pagh, A., Pagh, R., Rao, S.S.: An optimal bloom filter replacement. In: SODA (2005)
28.
go back to reference Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (corresp.). IEEE Trans. Inf. Theory 24(1), 106–110 (1978)CrossRef Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (corresp.). IEEE Trans. Inf. Theory 24(1), 106–110 (1978)CrossRef
29.
go back to reference Šeděnka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: ASIACCS (2014) Šeděnka, J., Gasti, P.: Privacy-preserving distance computation and proximity testing on earth, done right. In: ASIACCS (2014)
31.
go back to reference Siksnys, L., Thomsen, J.R., Saltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: MDM (2010) Siksnys, L., Thomsen, J.R., Saltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: MDM (2010)
32.
go back to reference Yao, A.C.: Protocols for secure computations. In: SFCS (1982) Yao, A.C.: Protocols for secure computations. In: SFCS (1982)
33.
go back to reference Yu, W., Liu, Z., Chen, C., Yang, B., Guan, X.: Privacy-preserving design for emergency response scheduling system in medical social networks. Peer-to-Peer Netw. Appl. 10(2), 340–356 (2017)CrossRef Yu, W., Liu, Z., Chen, C., Yang, B., Guan, X.: Privacy-preserving design for emergency response scheduling system in medical social networks. Peer-to-Peer Netw. Appl. 10(2), 340–356 (2017)CrossRef
35.
go back to reference Zheng, Y., Li, M., Lou, W., Hou, Y.T.: Location based handshake and private proximity test with location tags. IEEE Dependable Secure Comput. 14(4), 406–419 (2017)CrossRef Zheng, Y., Li, M., Lou, W., Hou, Y.T.: Location based handshake and private proximity test with location tags. IEEE Dependable Secure Comput. 14(4), 406–419 (2017)CrossRef
Metadata
Title
Faster Privacy-Preserving Location Proximity Schemes
Authors
Kimmo Järvinen
Ágnes Kiss
Thomas Schneider
Oleksandr Tkachenko
Zheng Yang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00434-7_1

Premium Partner