On Necessary Conditions for Secure Distributed Computation

نویسندگان

  • Rafail Ostrovsky
  • Moti Yung
چکیده

What assumptions are required to achieve an unconditionally secure distributed circuit evaluation in a fully connected network? This question was addressed with respect to the allowed number of malicious players [BGW, CCD, RB], given that every channel is unconditionally secure. In this paper we investigate whether the security of all channels is also a necessary condition. [BGW, CCD] showed how secure computation can be achieved, provided that a constant fraction of the total number of players is honest. An insecure channel can be modeled as faults on both ends of the channel. Thus, as long as the number of such \faulty" players is smaller then the fraction established in [BGW, CCD], the channels can be made insecure. However, an insecure channel seems to be a much weaker fault than a corruption of both players. Thus, can a bigger fraction of insecure channels be tolerated? In this paper we show that this is not the case. That is, we show that in some cases the perfect security of multi-party protocols in a fully connected network requires all the channels to be physically secure. In particular, we show a simple protocol (for three parties) for which if privacy of even one channel is compromised, the protocol can not be computed securely. Thus, we establish that the security of all channels is not only su cient (by the work of [BGW, CCD]), but also necessary . The lower bound holds even if players follow the protocol. That is, we establish our impossibility result even if all the players are honest but curious | if they follow the protocol exactly, but try to extract additional information \on the side". Thus, our result gives a pure security perspective of the impossibility. An additional feature of our result is its extreme simplicity, which is usually hard to come by for the lower bound proofs. AMS(MOS) Subject Classi cation: 68M10, 68P25, 68Q05. MIT Lab. for Computer Science Cambridge, MA 02139. E-mail to: \[email protected]". Part of this work was done while the author was at the IBM Research, T.J. Watson Research Center, Yorktown Heights, NY 10598. IBM Research, T.J. Watson Research Center, Yorktown Heights, NY 10598. E-mail to: \[email protected]".

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Separating indexes from data: a distributed scheme for secure database outsourcing

Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

Secure Computation for Biometric Data Security - Application to Speaker Verification

The goal of this research is to develop provable secure computation techniques for two biometric security tasks in complex distributed systems involving multiple parties; namely biometric data retrieval and authentication. We first present models for privacy and security that delineate the conditions under which biometric data disclosure are allowed. We then discuss the secure computation techn...

متن کامل

Secure analysis of distributed chemical databases without data integration

We present a method for performing statistically valid linear regressions on the union of distributed chemical databases that preserves confidentiality of those databases. The method employs secure multi-party computation to share local sufficient statistics necessary to compute least squares estimators of regression coefficients, error variances and other quantities of interest. We illustrate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1989