Network-Faithful Secure Computation

نویسندگان

  • Michael Kearns
  • Jinsong Tan
  • Jennifer Wortman
چکیده

We investigate privacy-preserving computation under a very general model for message-passing protocols over large networks. Our goal is to construct secure versions of such protocolswhile preserving the property of highly distributed, local computation. We present a general“compiler” that turns any message-passing protocol into one computing the same functionality ina way that is secure against single-party adversaries. We then give a simulation-based definitionof what it means for a secure protocol to be “faithful” to the original protocol and networkstructure, and prove that our compiler produces extremely faithful 1-private protocols. Finally,we show that there is an inherent trade-off between faithfulness and security against coalitions.In particular, for certain functionalities, any highly faithful protocol must be vulnerable tocollusion by small coalitions, thus proving the optimality of our compiler with respect to thistrade-off.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

پروتکل کارا برای جمع چندسویه امن با قابلیت تکرار

In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...

متن کامل

Key Technologies and Applications of Secure Multiparty Computation

With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introdu...

متن کامل

Secure Two-party Protocols for Point Inclusion Problem

It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the resulting protocols depend on the size of the circuit that expresses the functionality to be computed and hence can be impractical. Hence special solutions are needed for specific problems for efficiency reasons. The poi...

متن کامل

Secure Computation Under Network and Physical Attacks

Secure computation enables many parties to jointly compute a function of their private inputs. The security requirement is that the input privacy of any honest party is preserved even if other parties participating in the protocol collude or deviate from the protocol. In concurrent and physical attacks, adversarial parties try to break the privacy of honest parties by exploiting the network con...

متن کامل

Secure Multiparty Computation 4.1.1 Overview of Dining Cryptographers (dc) Problem . . . . . . . . . . . 41 List of Figures

Ray Kresman, Advisor Data mining algorithms help reveal hidden information in a repository. Distributed mining algorithms meet this need by distributing data and computation. One of the most important issues of these algorithms is how to safely mine the data. Secure Multiparty Computation (SMC), a framework for safe mining of distributed data, provides some security promises of the computation....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007