Secure aggregation of sufficiently many private inputs

article
Secure aggregation of distributed inputs is a well-studied problem. In this study, anonymity of inputs is achieved by assuring a minimal quota before publishing the outcome. We design and implement an efficient cryptographic protocol that mitigates the most important security risks and show its application in the cyber threat intelligence (CTI) domain. Our approach allows for generic aggregation and quota functions. With 20 inputs from different parties, we can do three secure and anonymous aggregations per second, and in a CTI community of 100 partners, 10, 000 aggregations could be performed during one night.
TNO Identifier
1020432
ISSN
2624909X
Source
Frontiers in Big Data(8), pp. 1-7.
Publisher
Frontiers Media SA
Article nr.
1638307
Pages
1-7
Files
To receive the publication files, please send an e-mail request to TNO Repository.