Configurable security protocols for multi-party data analysis with malicious participants

被引:0
|
作者
Malin, B [1 ]
Airoldi, E [1 ]
Edoho-Eket, S [1 ]
Li, YH [1 ]
机构
[1] Carnegie Mellon Univ, Sch Comp Sci, Data Privacy Lab, Pittsburgh, PA 15213 USA
来源
ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS | 2005年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Standard multi-party computation models assume semi-honest behavior where the majority of participants implement protocols according to specification, an assumption not always plausible. In this paper we introduce a multiparty protocol for collaborative data analysis when participants are malicious and fail to follow specification. The protocol incorporates a semi-trusted third party, which analyzes encrypted data and provides honest responses that only intended recipients can successfully decrypt. The protocol incorporates data confidentiality by enabling participants to receive encrypted responses tailored to their own encrypted data submissions without revealing plaintext to other participants, including the third party. As opposed to previous models, trust need only be placed on a single participant with no data at stake. Additionally, the proposed protocol is configurable in a way that security features are controlled by independent subprotocols. Various combinations of subprotocols allow for a flexible security system, appropriate for a number of distributed data applications, such as secure list comparison.
引用
收藏
页码:533 / 544
页数:12
相关论文
共 50 条
  • [21] Multi-Party Protocols, Information Complexity and Privacy
    Kerenidis, Iordanis
    Rosen, Adi
    Urrutia, Florent
    ACM TRANSACTIONS ON COMPUTATION THEORY, 2019, 11 (02)
  • [22] Quantum protocols for secure multi-party summation
    ZhaoXu Ji
    HuanGuo Zhang
    HouZhen Wang
    FuSheng Wu
    JianWei Jia
    WanQing Wu
    Quantum Information Processing, 2019, 18
  • [23] On the Efficiency of Multi-party Contract Signing Protocols
    Draper-Gil, Gerard
    Ferrer-Gomila, Josep-Lluis
    Francisca Hinarejos, M.
    Zhou, Jianying
    INFORMATION SECURITY, ISC 2015, 2015, 9290 : 227 - 243
  • [24] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [25] Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security
    Wu, Yulin
    Wang, Xuan
    Susilo, Willy
    Yang, Guomin
    Jiang, Zoe L.
    Li, Junyi
    Liu, Xueqiao
    COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [26] Composition of secure multi-party protocols - A comprehensive study
    Goldreich, O
    COMPOSITION OF SECURE MULTI-PARTY PROTOCOLS: A COMPREHENSIVE STUDY, 2003, 2815 : VII - +
  • [27] Improving the Efficiency of AES Protocols in Multi-Party Computation
    Durak, F. Betul
    Guajardo, Jorge
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 229 - 248
  • [28] Batch Logical Protocols for Efficient Multi-Party Computation
    Kiribuchi, Naoto
    Kato, Ryo
    Endo, Tsukasa
    Nishide, Takashi
    Yoshiura, Hiroshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (10) : 1718 - 1728
  • [29] SafeRegions: Performance evaluation of multi-party protocols on HBase
    Pontes, Rogerio
    Maia, Francisco
    Paulo, Joao
    Vilaca, Ricardo
    2016 IEEE 35TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS WORKSHOPS (SRDSW), 2016, : 31 - 36
  • [30] Fair multi-party non-repudiation protocols
    Steve Kremer
    Olivier Markowitch
    International Journal of Information Security, 2003, 1 (4) : 223 - 235