%0 Conference Proceedings %T A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection %+ Cybernetica [Tallinn] %+ National Institute of Information and Communications Technology [Tokyo] (NICT) %+ Toho University %A Bogdanov, Dan %A Emura, Keita %A Jagomägis, Roman %A Kanaoka, Akira %A Matsuo, Shin’ichiro %A Willemson, Jan %Z Part 4: Privacy %< avec comité de lecture %( Lecture Notes in Computer Science %B 8th IFIP International Workshop on Information Security Theory and Practice (WISTP) %C Heraklion, Crete, Greece %Y David Naccache %Y Damien Sauveron %I Springer %3 Information Security Theory and Practice. Securing the Internet of Things %V LNCS-8501 %P 108-123 %8 2014-06-30 %D 2014 %R 10.1007/978-3-662-43826-8_8 %K privacy %K secure multi-party computation %K genetic algorithms %Z Computer Science [cs]Conference papers %X We propose a method for applying genetic algorithms to confidential data. Genetic algorithms are a well-known tool for finding approximate solutions to various optimization and searching problems. More specifically, we present a secure solution for solving the subset cover problem which is formulated by a binary integer linear programming (BIP) problem (i.e. a linear programming problem, where the solution is expected to be a 0-1 vector). Our solution is based on secure multi-party computation. We give a privacy definition inspired from semantic security definitions and show how a secure computation system based on secret sharing satisfies this definition. Our solution also achieves security against timing attacks, as the execution of the secure algorithm on two different inputs is indistinguishable to the observer. We implement and benchmark our solution on the SHAREMIND secure computation system. Performance tests show that our privacy-preserving implementation achieves a 99.32% precision within 6.5 seconds on a BIP problem of moderate size. As an application of our algorithm, we consider the problem of securely outsourcing risk assessment of an end user computer environment. %G English %Z TC 11 %Z WG 11.2 %2 https://inria.hal.science/hal-01400929/document %2 https://inria.hal.science/hal-01400929/file/978-3-662-43826-8_8_Chapter.pdf %L hal-01400929 %U https://inria.hal.science/hal-01400929 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-WISTP %~ IFIP-WG11-2 %~ IFIP-LNCS-8501