Application of Randomness for Security and Privacy in Multi-Party Computation

被引:2
|
作者
Saha, Rahul [1 ,2 ]
Kumar, Gulshan [1 ,2 ]
Geetha, G. [3 ]
Conti, Mauro [1 ]
Buchanan, William J. [4 ]
机构
[1] Univ Padua, Dept Math, I-35122 Padua, Italy
[2] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144001, Punjab, India
[3] Jain Univ, Sch Comp Sci & Informat Technol, Bengaluru 560069, Karnataka, India
[4] Edinburgh Napier Univ, Blockpass ID Lab, Edinburgh EH11 1PA, Scotland
关键词
Cryptography; Privacy; Information theory; Signal generators; Protocols; Mathematical models; Internet of Things; Computation; cryptography; function; information; multi-party; privacy; randomness; security; SECRET; GENERATOR;
D O I
10.1109/TDSC.2024.3381959
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secure Multi-Party Computation (MPC) is one of the distributed computational methods, where it computes a function over the inputs given by more than one party jointly and keeps those inputs private from the parties involved in the process. Randomization in secret sharing leading to MPC is a requirement for privacy enhancements; however, most of the available MPC models use the trust assumptions of sharing and combining values. Thus, randomization in secret sharing and MPC modules is neglected. As a result, the available MPC models are prone to information leakage problems, where the models can reveal the partial values of the sharing secrets. In this paper, we propose the first model of utilizing a random function generator as an MPC primitive. More specifically, we analyze our previous development of the Symmetric Random Function Generator (SRFG) for information-theoretic security, where the system is considered to have unconditional security if it is secure against adversaries with unlimited computing resources and time. Further, we apply SRFG to eradicate the problem of information leakage in the general MPC model. Through a set of experiments, we show that SRFG is a function generator that can generate the combined functions (combination of logic GATEs) with $n/2$n/2 -private to $n$n-private norms. As the main goal of MPC is privacy preservation of the inputs, we analyze the applicability of SRFG properties in secret sharing and MPC and observe that SRFG is eligible to be a cryptographic primitive in MPCdevelopments. We also measure the performance of our proposed SRFG-based MPC framework with the other randomness generation-based MPC frameworks and analyze the comparative attributes with the state-of-the-art models. We observe that our posed SRFG-based MPC is $\approx 30\%$approximate to 30% better in terms of throughput and also shows 100% privacy attainment.
引用
收藏
页码:5694 / 5705
页数:12
相关论文
共 50 条
  • [41] A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain
    Liu F.
    Yang J.
    Li Z.
    Qi J.
    Li, Zhibin (lizb@cs.ecnu.edu.cn); Qi, Jiayin (ai@suibe.edu.cn), 2021, Science Press (58): : 281 - 290
  • [42] Privacy-Preserving Secure Computation of Skyline Query in Distributed Multi-Party Databases †
    Qaosar, Mahboob
    Zaman, Asif
    Siddique, Md. Anisuzzaman
    Annisa
    Morimoto, Yasuhiko
    INFORMATION, 2019, 10 (03):
  • [43] SENTINEY: Securing ENcrypted mulTI-party computatIoN for Enhanced data privacY and phishing detection
    Hendaoui, Fatma
    Hendaoui, Saloua
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 256
  • [44] Toward Privacy-Preserving Interdomain Configuration Verification via Multi-Party Computation
    Xu, Huisan
    Qin, Qiuyue
    Fang, Xing
    Xiang, Qiao
    Shu, Jiwu
    PROCEEDINGS OF THE 7TH ASIA-PACIFIC WORKSHOP ON NETWORKING, APNET 2023, 2023, : 28 - 33
  • [45] Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation
    Zarezadeh, Maryam
    Mala, Hamid
    Khajeh, Homa
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 35 (04) : 863 - 874
  • [46] Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation
    Maryam Zarezadeh
    Hamid Mala
    Homa Khajeh
    Journal of Computer Science and Technology, 2020, 35 : 863 - 874
  • [47] Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
    Pettai, Martin
    Laud, Peeter
    2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 75 - 89
  • [48] Secure multi-party computation in deep learning : Enhancing privacy in distributed neural networks
    Sagar, P. Vidya
    Ghanimi, Hayder M. A.
    Prabhu, L. Arokia Jesu
    Raja, L.
    Dadheech, Pankaj
    Sengan, Sudhakar
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 249 - 259
  • [49] Privacy-Preserving Power Flow Analysis via Secure Multi-Party Computation
    von der Heyden, Jonas
    Schlueter, Nils
    Binfet, Philipp
    Asman, Martin
    Zdrallek, Markus
    Jager, Tibor
    Darup, Moritz Schulze
    IEEE TRANSACTIONS ON SMART GRID, 2025, 16 (01) : 344 - 355
  • [50] Privacy preserving E-negotiation protocols based on secure multi-party computation
    Chakraborty, S
    Sehgal, SK
    Pal, AK
    PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: EXCELLENCE IN ENGINEERING, SCIENCE, AND TECHNOLOGY, 2005, : 455 - 461