Application of Randomness for Security and Privacy in Multi-Party Computation

被引:2
|
作者
Saha, Rahul [1 ,2 ]
Kumar, Gulshan [1 ,2 ]
Geetha, G. [3 ]
Conti, Mauro [1 ]
Buchanan, William J. [4 ]
机构
[1] Univ Padua, Dept Math, I-35122 Padua, Italy
[2] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144001, Punjab, India
[3] Jain Univ, Sch Comp Sci & Informat Technol, Bengaluru 560069, Karnataka, India
[4] Edinburgh Napier Univ, Blockpass ID Lab, Edinburgh EH11 1PA, Scotland
关键词
Cryptography; Privacy; Information theory; Signal generators; Protocols; Mathematical models; Internet of Things; Computation; cryptography; function; information; multi-party; privacy; randomness; security; SECRET; GENERATOR;
D O I
10.1109/TDSC.2024.3381959
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secure Multi-Party Computation (MPC) is one of the distributed computational methods, where it computes a function over the inputs given by more than one party jointly and keeps those inputs private from the parties involved in the process. Randomization in secret sharing leading to MPC is a requirement for privacy enhancements; however, most of the available MPC models use the trust assumptions of sharing and combining values. Thus, randomization in secret sharing and MPC modules is neglected. As a result, the available MPC models are prone to information leakage problems, where the models can reveal the partial values of the sharing secrets. In this paper, we propose the first model of utilizing a random function generator as an MPC primitive. More specifically, we analyze our previous development of the Symmetric Random Function Generator (SRFG) for information-theoretic security, where the system is considered to have unconditional security if it is secure against adversaries with unlimited computing resources and time. Further, we apply SRFG to eradicate the problem of information leakage in the general MPC model. Through a set of experiments, we show that SRFG is a function generator that can generate the combined functions (combination of logic GATEs) with $n/2$n/2 -private to $n$n-private norms. As the main goal of MPC is privacy preservation of the inputs, we analyze the applicability of SRFG properties in secret sharing and MPC and observe that SRFG is eligible to be a cryptographic primitive in MPCdevelopments. We also measure the performance of our proposed SRFG-based MPC framework with the other randomness generation-based MPC frameworks and analyze the comparative attributes with the state-of-the-art models. We observe that our posed SRFG-based MPC is $\approx 30\%$approximate to 30% better in terms of throughput and also shows 100% privacy attainment.
引用
收藏
页码:5694 / 5705
页数:12
相关论文
共 50 条
  • [31] On Concurrent Multi-party Quantum Computation
    Goyal, Vipul
    Liang, Xiao
    Malavolta, Giulio
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 129 - 161
  • [32] Graceful Degradation in Multi-Party Computation
    Hirt, Martin
    Lucas, Christoph
    Maurer, Ueli
    Raub, Dominik
    INFORMATION THEORETIC SECURITY, (ICITS 2011), 2011, 6673 : 163 - 180
  • [33] Differentially Private Multi-party Computation
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [34] Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-Party Setting
    Maffei, Matteo
    Malavolta, Giulio
    Reinert, Manuel
    Schroeder, Dominique
    PROCEEDINGS OF THE 2014 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'14), 2014, : 144 - 146
  • [35] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [36] Shared Randomness and Quantum Communication in the Multi-Party Model
    Gavinsky, Dmitry
    Ito, Tsuyoshi
    Wang, Guoming
    2013 IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC), 2013, : 34 - 43
  • [37] NRV: Leveraging Secure Multi-Party Computation for Lightweight BGP Security Enhancement
    Zhang, Guoqiang
    Xu, Mingwei
    Li, Jiang
    2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
  • [38] Efficient Secure Multi-party Computation for Multi-dimensional Arithmetics and Its Application in Privacy-Preserving Biometric Identification
    Wu, Dongyu
    Liang, Bei
    Lu, Zijie
    Ding, Jintai
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2024, PT I, 2025, 14905 : 3 - 25
  • [39] Efficient privacy-preserving Gaussian process via secure multi-party computation
    Liu, Shiyu
    Luo, Jinglong
    Zhang, Yehong
    Wang, Hui
    Yu, Yue
    Xu, Zenglin
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 151
  • [40] Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces
    Choi, Seung Geol
    Hwang, Kyung-Wook
    Katz, Jonathan
    Malkin, Tal
    Rubenstein, Dan
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 416 - +