Network-Faithful Secure Computation
نویسندگان
چکیده
We investigate privacy-preserving computation under a very general model for message-passing protocols over large networks. Our goal is to construct secure versions of such protocolswhile preserving the property of highly distributed, local computation. We present a general“compiler” that turns any message-passing protocol into one computing the same functionality ina way that is secure against single-party adversaries. We then give a simulation-based definitionof what it means for a secure protocol to be “faithful” to the original protocol and networkstructure, and prove that our compiler produces extremely faithful 1-private protocols. Finally,we show that there is an inherent trade-off between faithfulness and security against coalitions.In particular, for certain functionalities, any highly faithful protocol must be vulnerable tocollusion by small coalitions, thus proving the optimality of our compiler with respect to thistrade-off.
منابع مشابه
پروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملKey Technologies and Applications of Secure Multiparty Computation
With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introdu...
متن کاملSecure Two-party Protocols for Point Inclusion Problem
It is well known that, in theory, the general secure multiparty computation problem is solvable using circuit evaluation protocols. However, the communication complexity of the resulting protocols depend on the size of the circuit that expresses the functionality to be computed and hence can be impractical. Hence special solutions are needed for specific problems for efficiency reasons. The poi...
متن کاملSecure Computation Under Network and Physical Attacks
Secure computation enables many parties to jointly compute a function of their private inputs. The security requirement is that the input privacy of any honest party is preserved even if other parties participating in the protocol collude or deviate from the protocol. In concurrent and physical attacks, adversarial parties try to break the privacy of honest parties by exploiting the network con...
متن کاملSecure Multiparty Computation 4.1.1 Overview of Dining Cryptographers (dc) Problem . . . . . . . . . . . 41 List of Figures
Ray Kresman, Advisor Data mining algorithms help reveal hidden information in a repository. Distributed mining algorithms meet this need by distributing data and computation. One of the most important issues of these algorithms is how to safely mine the data. Secure Multiparty Computation (SMC), a framework for safe mining of distributed data, provides some security promises of the computation....
متن کامل