%0 Conference Proceedings %T Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol %+ Università degli Studi di Milano = University of Milan (UNIMI) %A Abbasi, Sedigheh %A Cimato, Stelvio %A Damiani, Ernesto %Z Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES) %< avec comité de lecture %( Lecture Notes in Computer Science %B 1st International Conference on Information and Communication Technology (ICT-EurAsia) %C Yogyakarta, Indonesia %Y David Hutchison %Y Takeo Kanade %Y Madhu Sudan %Y Demetri Terzopoulos %Y Doug Tygar %Y Moshe Y. Vardi %Y Gerhard Weikum %Y Khabib Mustofa %Y Erich J. Neuhold %Y A Min Tjoa %Y Edgar Weippl %Y Ilsun You %Y Josef Kittler %Y Jon M. Kleinberg %Y Friedemann Mattern %Y John C. Mitchell %Y Moni Naor %Y Oscar Nierstrasz %Y C. Pandu Rangan %Y Bernhard Steffen %I Springer %3 Information and Communicatiaon Technology %V LNCS-7804 %P 447-452 %8 2013-03-25 %D 2013 %R 10.1007/978-3-642-36818-9_49 %K Secure Multi-Party Computation %K Privacy-Preserving Clustering %K Privacy and Efficiency Tradeoff %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X Despite a large amount of research work has been done and a large number of results produced, the deployment of Secure Multi-party Computation (SMC) protocols for solving practical problems in real world scenarios is still an issue. This is mainly due to the complexity of the SMC-based solutions and to the needed assumptions that are not easy to fit to the considered problem. In this paper we propose an innovative approach for the deployment of SMC, providing a tradeoff between efficiency and privacy. In the Secure Clustered Multi-Party Computation (SCMC) approach, a function is more efficiently computed through reducing the number of participants to the SMC protocol by clustering, such that a reasonable privacy leakage inside the cluster is allowed. Toward this direction, this paper verifies the impact and the feasibility of applying different clustering techniques over the participants to a SMC protocol and proposes an effective specifically-tailored clustering protocol. %G English %Z TC 5 %Z TC 8 %2 https://inria.hal.science/hal-01480202/document %2 https://inria.hal.science/hal-01480202/file/978-3-642-36818-9_49_Chapter.pdf %L hal-01480202 %U https://inria.hal.science/hal-01480202 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC5 %~ IFIP-TC8 %~ IFIP-ICT-EURASIA %~ IFIP-LNCS-7804