Brief Announcement: Secure Data Structures based on Multi-Party Computation

被引:0
|
作者
Toft, Tomas [1 ]
机构
[1] Aarhus Univ, Dept CS, DK-8200 Aarhus N, Denmark
关键词
Reactive functionalities; secure multi-party computation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work considers data structures based on multi-party computation (MPC) primitives: structuring secret (e.g. secret shared and potentially unknown) data such that it can both be queried and updated efficiently. Implementing an oblivious RAM (ORAM) using MPC allows any existing data structure to be realized using MPC primitives, however, by focusing on a specific example a priority queue it is shown that it is possible to achieve much better results than the generic solutions can provide. Moreover, the techniques differ significantly from existing ORAM constructions. Indeed it has recently been shown that any information theoretically secure ORAM with n memory locations requires at least log n random bits per read/write to hide the access pattern. In contrast, the present construction achieves security with a completely deterministic access pattern.
引用
收藏
页码:291 / 292
页数:2
相关论文
共 50 条
  • [1] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [2] Conclave: secure multi-party computation on big data
    Volgushev, Nikolaj
    Schwarzkopf, Matte
    Ben Getchell
    Varia, Mayank
    Lapets, Andrei
    Bestavros, Azer
    [J]. PROCEEDINGS OF THE FOURTEENTH EUROSYS CONFERENCE 2019 (EUROSYS '19), 2019,
  • [3] SECURE MULTI-PARTY COMPUTATION PROTOCOL FOR STATISTICAL COMPUTATION ON ENCRYPTED DATA
    Pathak, Rohit
    Joshi, Satyadhar
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 78 - +
  • [4] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [5] Quorum-based secure multi-party computation
    Beaver, D
    Wool, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 375 - 390
  • [6] Privacy preserving distributed data mining based on secure multi-party computation
    Liu, Jun
    Tian, Yuan
    Zhou, Yu
    Xiao, Yang
    Ansari, Nirwan
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 208 - 216
  • [7] A trusted IoT data sharing method based on secure multi-party computation
    Ma, Li
    Duan, Binbin
    Zhang, Bo
    Li, Yang
    Fu, Yingxun
    Ma, Dongchao
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [8] Secure Multi-Party Quantum Computation Based on Blind Quantum Computation
    Gui-Ju Qu
    Ming-Ming Wang
    [J]. International Journal of Theoretical Physics, 2021, 60 : 3003 - 3012
  • [9] Secure Multi-Party Quantum Computation Based on Blind Quantum Computation
    Qu, Gui-Ju
    Wang, Ming-Ming
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (08) : 3003 - 3012
  • [10] Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data
    Pathak, Rohit
    Joshi, Satyadhar
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 412 - +