首页> 外文期刊>IEEE transactions on information forensics and security >Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence
【24h】

Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence

机译:具有共谋威慑的信息论安全多方计算

获取原文
获取原文并翻译 | 示例

摘要

Secure multi-party computation (MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. Among many secure MPC primitives, Shamir’s secret sharing (SSS) has the advantages of having low complexity and information-theoretic security. However, SSS requires multiple honest participants and is susceptible to collusion attacks. In this paper, we provide a detailed analysis of different types of collusion attacks and propose novel mechanisms to deter such attacks in a fully distributed manner. Focusing on outsourced computing environments where secret data owners can collaborate on a public computing platform, we study collusion attacks using game theory. For those attacks where the thefts are detectable, we show that they can be effectively deterred by an explicit retaliation mechanism between data owners. The result is based on a comprehensive analysis that takes into account the cost of collusion, the privacy preference, and the associated uncertainty. For those attacks where the thefts cannot be detected, we expand the analysis to include the computing platform and provide deterrence through deceptive collusion requests as well as a novel cryptographic censorship protocol. The correctness and the privacy of the protocols are proved under the rational adversarial model. Our SSS-based protocols are shown to outperform the state-of-the-art garbled circuit systems, while our simulation results validate the proposed mechanism designs in deterring collusion.
机译:安全多方计算(MPC)已被确立为事实上的范式,用于保护分布式计算中的隐私。在许多安全的MPC原语中,Shamir的秘密共享(SSS)具有低复杂度和信息理论安全性的优点。但是,SSS需要多个诚实的参与者,并且容易受到串通攻击。在本文中,我们提供了对不同类型的共谋攻击的详细分析,并提出了新颖的机制以完全分布式的方式阻止此类攻击。针对秘密数据所有者可以在公共计算平台上进行协作的外包计算环境,我们使用博弈论研究共谋攻击。对于那些可以检测到盗窃的攻击,我们表明,可以通过数据所有者之间的明确报复机制来有效地阻止它们。结果是基于综合分析得出的,该分析考虑了串通成本,隐私偏好和相关的不确定性。对于那些无法检测到盗窃的攻击,我们将分析范围扩大到包括计算平台,并通过欺骗性合谋请求以及新颖的密码检查协议提供威慑力。在合理的对抗模型下证明了协议的正确性和保密性。我们的基于SSS的协议表现出优于最新的乱码电路系统,而我们的仿真结果验证了拟议的机制设计在防止串通中的作用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号