Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries

被引:0
|
作者
Gupta, Peeyush [1 ]
Li, Yin [2 ]
Mehrotra, Sharad [1 ]
Panwar, Nisha [1 ,3 ]
Sharma, Shantanu [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA 92697 USA
[2] Xinyang Normal Univ, Xinyang, Peoples R China
[3] Augusta Univ, Augusta, GA USA
基金
中国国家自然科学基金;
关键词
Oblivious computation; secret-sharing; scalability; verification;
D O I
10.1145/3374664.3379533
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We develop a secret-sharing-based prototype, entitled Obscure that provides communication-efficient and information-theoretically secure algorithms for aggregation queries using secret-sharing. The query execution algorithms deals with an honest-but-curious, as well as, a malicious server, by supporting result verification. In addition, Obscure prevents an adversary to know the data, the query, and the tuple-identity satisfying the query.
引用
收藏
页码:165 / 167
页数:3
相关论文
共 50 条
  • [21] PERCOLATION ON THE INFORMATION-THEORETICALLY SECURE SIGNAL TO INTERFERENCE RATIO GRAPH
    Vaze, Rahul
    Iyer, Srikanth
    JOURNAL OF APPLIED PROBABILITY, 2014, 51 (04) : 910 - 920
  • [22] Efficient information-theoretically secure schemes for cloud data outsourcing
    Sobati-Moghadam, Somayeh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (04): : 3591 - 3606
  • [23] Information-Theoretically Secure and Highly Efficient Search and Row Retrieval
    Sharma, Shantanu
    Li, Yin
    Mehrotra, Sharad
    Panwar, Nisha
    Kumari, Komal
    Roychoudhury, Swagnik
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (10): : 2391 - 2403
  • [24] ITSEC: An Information-theoretically Secure Framework for Truthful Spectrum Auctions
    Chen, Zhili
    Huang, Liusheng
    Chen, Lin
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [25] Efficient information-theoretically secure schemes for cloud data outsourcing
    Somayeh Sobati-Moghadam
    Cluster Computing, 2021, 24 : 3591 - 3606
  • [26] Information-Theoretically Secure Key-Insulated Key-Agreement
    Seito, Takenobu
    Shikata, Junji
    2011 IEEE INFORMATION THEORY WORKSHOP (ITW), 2011,
  • [27] Rational Secret Sharing Information-theoretically Secure Against Adaptive Adversaries
    Yu, Yang
    Zhou, Zhanfei
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 249 - 256
  • [28] Information-Theoretically Secure String Commitments Based on Packet Reordering Channels
    de Morais Alves, Vinicius
    Dowsley, Rafael
    de Sousa, Rafael Timoteo, Jr.
    Nascimento, Anderson C. A.
    IEEE ACCESS, 2021, 9 : 139928 - 139945
  • [29] Information-Theoretically Secure Entity Authentication in the Multi-user Setting
    Hajime, Shogo
    Watanabe, Yohei
    Shikata, Junji
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 400 - 417
  • [30] Information-Theoretically Secure Data Origin Authentication with Quantum and Classical Resources
    Nikolopoulos, Georgios M.
    Fischlin, Marc
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 10