Wiretap Codes for Secure Multi-Party Computation

被引:0
|
作者
Thobaben, Ragnar [1 ]
Dan, Gyorgy
Sandberg, Henrik
机构
[1] KTH Royal Inst Technol, SE-10044 Stockholm, Sweden
关键词
POLAR CODES; CHANNELS; SECRET;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a new secret sharing scheme for secure multi-party computation. We present a general framework that allows us to construct efficient secret sharing schemes from channel coding techniques for the wiretap channel. The resulting schemes can be employed to securely calculate linear functions of data that are distributed in a network without leaking any information on the data except the desired result. For the examples considered in this paper, our schemes minimize the communication overhead while keeping the data perfectly secure. Compared to conventional schemes, for which the communication overhead grows quadratically in the number of clients in the considered scenarios, the communication overhead for our approach grows only linearly with the number of clients. This property is maintained even if our secret sharing scheme is set up to introduce redundancy in order to compensate for losses of secret shares. While we only consider the case of passive eavesdroppers and implementations based on nested Reed-Solomon codes in this paper, the proposed framework can also be applied in other cases (e.g., when clients tamper with the data) by taking into account the effects of attacks in the design of the underlying wiretap code.
引用
收藏
页码:1349 / 1354
页数:6
相关论文
共 50 条
  • [1] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [2] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [3] Information theory and secure multi-party computation
    Maurer, UM
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [4] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [5] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [6] Secure multi-party computation made simple
    Maurer, U
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [7] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [8] Secure multi-party computation made simple
    Maurer, U
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [9] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [10] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    [J]. Journal of Cryptology, 2005, 18 : 247 - 287