Configurable security protocols for multi-party data analysis with malicious participants

被引:0
|
作者
Malin, B [1 ]
Airoldi, E [1 ]
Edoho-Eket, S [1 ]
Li, YH [1 ]
机构
[1] Carnegie Mellon Univ, Sch Comp Sci, Data Privacy Lab, Pittsburgh, PA 15213 USA
来源
ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS | 2005年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Standard multi-party computation models assume semi-honest behavior where the majority of participants implement protocols according to specification, an assumption not always plausible. In this paper we introduce a multiparty protocol for collaborative data analysis when participants are malicious and fail to follow specification. The protocol incorporates a semi-trusted third party, which analyzes encrypted data and provides honest responses that only intended recipients can successfully decrypt. The protocol incorporates data confidentiality by enabling participants to receive encrypted responses tailored to their own encrypted data submissions without revealing plaintext to other participants, including the third party. As opposed to previous models, trust need only be placed on a single participant with no data at stake. Additionally, the proposed protocol is configurable in a way that security features are controlled by independent subprotocols. Various combinations of subprotocols allow for a flexible security system, appropriate for a number of distributed data applications, such as secure list comparison.
引用
收藏
页码:533 / 544
页数:12
相关论文
共 50 条
  • [1] Limitations of Authentication Test in the Analysis of Multi-party Security Protocols
    Wei-tao, Song
    Bin, Hu
    PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2243 - 2247
  • [2] Adaptive Security of Multi-party Protocols, Revisited
    Hirt, Martin
    Liu-Zhang, Chen-Da
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT I, 2021, 13042 : 686 - 716
  • [3] Configurable analysis of sequential multi-party choreographies
    Schoenberger, Andreas
    Wirtz, Guido
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2012, 27 (02): : 117 - 132
  • [4] A robust multi-party key agreement protocol resistant to malicious participants
    Tseng, YM
    COMPUTER JOURNAL, 2005, 48 (04): : 480 - 487
  • [5] Data Federation System for Multi-party Security
    Li S.-Y.
    Ji Y.-D.
    Shi D.-Y.
    Liao W.-D.
    Zhang L.-P.
    Tong Y.-X.
    Xu K.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (03): : 1111 - 1127
  • [6] Circuits and multi-party protocols
    Grolmusz, V
    COMPUTATIONAL COMPLEXITY, 1998, 7 (01) : 1 - 18
  • [7] Circuits and multi-party protocols
    V. Grolmusz
    computational complexity, 1998, 7 : 1 - 18
  • [8] Towards automated design of multi-party rational exchange security protocols
    Alcaide, Almudena
    Estevez-Tapiador, Juan M.
    Hemandez-Castro, Julio C.
    Ribagorda, Arturo
    PROCEEDING OF THE 2007 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS, 2007, : 387 - 390
  • [9] Adaptive versus non-adaptive security of multi-party protocols
    Canetti, R
    Damgård, I
    Dziembowski, S
    Ishai, Y
    Malkin, T
    JOURNAL OF CRYPTOLOGY, 2004, 17 (03) : 153 - 207
  • [10] Adaptive versus Non-Adaptive Security of Multi-Party Protocols
    Ran Canetti
    Ivan Damgard
    Stefan Dziembowski
    Yuval Ishai
    Tal Malkin
    Journal of Cryptology, 2004, 17 : 153 - 207