Application of Randomness for Security and Privacy in Multi-Party Computation

被引:2
|
作者
Saha, Rahul [1 ,2 ]
Kumar, Gulshan [1 ,2 ]
Geetha, G. [3 ]
Conti, Mauro [1 ]
Buchanan, William J. [4 ]
机构
[1] Univ Padua, Dept Math, I-35122 Padua, Italy
[2] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144001, Punjab, India
[3] Jain Univ, Sch Comp Sci & Informat Technol, Bengaluru 560069, Karnataka, India
[4] Edinburgh Napier Univ, Blockpass ID Lab, Edinburgh EH11 1PA, Scotland
关键词
Cryptography; Privacy; Information theory; Signal generators; Protocols; Mathematical models; Internet of Things; Computation; cryptography; function; information; multi-party; privacy; randomness; security; SECRET; GENERATOR;
D O I
10.1109/TDSC.2024.3381959
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secure Multi-Party Computation (MPC) is one of the distributed computational methods, where it computes a function over the inputs given by more than one party jointly and keeps those inputs private from the parties involved in the process. Randomization in secret sharing leading to MPC is a requirement for privacy enhancements; however, most of the available MPC models use the trust assumptions of sharing and combining values. Thus, randomization in secret sharing and MPC modules is neglected. As a result, the available MPC models are prone to information leakage problems, where the models can reveal the partial values of the sharing secrets. In this paper, we propose the first model of utilizing a random function generator as an MPC primitive. More specifically, we analyze our previous development of the Symmetric Random Function Generator (SRFG) for information-theoretic security, where the system is considered to have unconditional security if it is secure against adversaries with unlimited computing resources and time. Further, we apply SRFG to eradicate the problem of information leakage in the general MPC model. Through a set of experiments, we show that SRFG is a function generator that can generate the combined functions (combination of logic GATEs) with $n/2$n/2 -private to $n$n-private norms. As the main goal of MPC is privacy preservation of the inputs, we analyze the applicability of SRFG properties in secret sharing and MPC and observe that SRFG is eligible to be a cryptographic primitive in MPCdevelopments. We also measure the performance of our proposed SRFG-based MPC framework with the other randomness generation-based MPC frameworks and analyze the comparative attributes with the state-of-the-art models. We observe that our posed SRFG-based MPC is $\approx 30\%$approximate to 30% better in terms of throughput and also shows 100% privacy attainment.
引用
收藏
页码:5694 / 5705
页数:12
相关论文
共 50 条
  • [1] Application of Multi-Party Computation in Data Security and Privacy Protection under the Context of Blockchain
    Jiang, Rongwang
    Long, Caofang
    Yang, Ming
    Liang, Zhiyong
    2024 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS, ICICI 2024, 2024, : 683 - 688
  • [2] Privacy in Multi-party Computation in MapReduce
    Ferdaus, Syeda Israt
    Adnan, Muhammad Abdullah
    2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), 2019, : 365 - 369
  • [3] Multi-party Computation for Privacy and Security in Machine Learning: a practical review
    Bellini, Alessandro
    Bellini, Emanuele
    Bertini, Massimo
    Almhaithawi, Doaa
    Cuomo, Stefano
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 174 - 179
  • [4] Multi-party computation with hybrid security
    Fitzi, M
    Holenstein, T
    Wullschleger, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 419 - 438
  • [5] Significance of Privacy and Security in ICT: A Case study using Secure Multi-Party Computation for Preserving Privacy
    Mishra, Durgesh Kumar
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [6] Multi-Party Computation in IoT for Privacy-Preservation
    Goyal, Himanshu
    Saha, Sudipta
    2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 1280 - 1281
  • [7] PolyDot Coded Privacy Preserving Multi-Party Computation at the Edge
    Vedadi, Elahe
    Keshtkarjahromi, Yasaman
    Seferoglu, Hulya
    2022 IEEE 23RD INTERNATIONAL WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATION (SPAWC), 2022,
  • [8] Privacy-Preserving Query Processing by Multi-Party Computation
    Sepehri, Maryam
    Cimato, Stelvio
    Damiani, Ernesto
    COMPUTER JOURNAL, 2015, 58 (10): : 2195 - 2212
  • [9] Pseudo-signatures, broadcast, and multi-party computation from correlated randomness
    Fitzi, M
    Wolf, S
    Wullschleger, R
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 562 - 578
  • [10] Application of Secure Multi-party Computation in Linear Programming
    Fu Zu-feng
    Wang Hai-ying
    Wu Yong-wu
    2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248