A New Approach to Interdomain Routing Based on Secure Multi-Party Computation

被引:0
|
作者
Gupta, Debayan [1 ]
Segal, Aaron [1 ]
Panda, Aurojit [2 ]
Segev, Gil [3 ]
Schapira, Michael [4 ]
Feigenbaum, Joan [1 ]
Rexford, Jenifer [5 ]
Shenker, Scott [2 ]
机构
[1] Yale Univ, New Haven, CT 06520 USA
[2] Univ Calif Berkeley, Berkeley, CA 94720 USA
[3] Microsoft Res Silicon Valley, Mountain View, CA 94040 USA
[4] Hebrew Univ Jerusalem, IL-91905 Jerusalem, Israel
[5] Princeton Univ, Princeton, NJ 08544 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Interdomain routing involves coordination among mutually distrustful parties, leading to the requirements that BGP provide policy autonomy, flexibility, and privacy. BGP provides these properties via the distributed execution of policy-based decisions during the iterative route computation process. This approach has poor convergence properties, makes planning and failover difficult, and is extremely difficult to change. To rectify these and other problems, we propose a radically different approach to interdomain-route computation, based on secure multi-party computation (SMPC). Our approach provides stronger privacy guarantees than BGP and enables the deployment of new policy paradigms. We report on an initial exploration of this idea and outline future directions for research.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 50 条
  • [1] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    [J]. EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [2] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [3] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [4] Quorum-based secure multi-party computation
    Beaver, D
    Wool, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 375 - 390
  • [5] Secure Multi-Party Quantum Computation Based on Blind Quantum Computation
    Gui-Ju Qu
    Ming-Ming Wang
    [J]. International Journal of Theoretical Physics, 2021, 60 : 3003 - 3012
  • [6] Secure Multi-Party Quantum Computation Based on Blind Quantum Computation
    Qu, Gui-Ju
    Wang, Ming-Ming
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (08) : 3003 - 3012
  • [7] An Electronic Voting Scheme Based On Secure Multi-Party Computation
    Gang, Cao
    [J]. ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 292 - 294
  • [8] Securing of Clouds Based on Lightweight Secure Multi-party Computation
    Takahashi, Kouta
    Sato, Fumiaki
    [J]. COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, 2019, 772 : 452 - 464
  • [9] Information theory and secure multi-party computation
    Maurer, UM
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [10] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287