Configurable security protocols for multi-party data analysis with malicious participants

被引:0
|
作者
Malin, B [1 ]
Airoldi, E [1 ]
Edoho-Eket, S [1 ]
Li, YH [1 ]
机构
[1] Carnegie Mellon Univ, Sch Comp Sci, Data Privacy Lab, Pittsburgh, PA 15213 USA
来源
ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS | 2005年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Standard multi-party computation models assume semi-honest behavior where the majority of participants implement protocols according to specification, an assumption not always plausible. In this paper we introduce a multiparty protocol for collaborative data analysis when participants are malicious and fail to follow specification. The protocol incorporates a semi-trusted third party, which analyzes encrypted data and provides honest responses that only intended recipients can successfully decrypt. The protocol incorporates data confidentiality by enabling participants to receive encrypted responses tailored to their own encrypted data submissions without revealing plaintext to other participants, including the third party. As opposed to previous models, trust need only be placed on a single participant with no data at stake. Additionally, the proposed protocol is configurable in a way that security features are controlled by independent subprotocols. Various combinations of subprotocols allow for a flexible security system, appropriate for a number of distributed data applications, such as secure list comparison.
引用
收藏
页码:533 / 544
页数:12
相关论文
共 50 条
  • [31] Improvement of Quantum Protocols for Secure Multi-Party Summation
    Gan Zhi-Gang
    International Journal of Theoretical Physics, 2020, 59 : 3086 - 3092
  • [32] Protocols for Secure Multi-Party Private Function Evaluation
    Aljumah, Feras
    Soeanu, Andrei
    Liu, Wen Ming
    Debbabi, Mourad
    2015 FIRST INTERNATIONAL CONFERENCE ON ANTI-CYBERCRIME (ICACC), 2015, : 106 - 111
  • [33] Mediated Secure Multi-Party Protocols for Collaborative Filtering
    Shmueli E.
    Tassa T.
    ACM Transactions on Intelligent Systems and Technology, 2020, 11 (02)
  • [34] Constructing Optimistic Multi-party Contract Signing Protocols
    Kordy, Barbara
    Radomirovic, Sasa
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 215 - 229
  • [35] Multi-party key agreement protocols with cheater identification
    Tseng, YM
    APPLIED MATHEMATICS AND COMPUTATION, 2003, 145 (2-3) : 551 - 559
  • [36] On the security of a multi-party certified email protocol
    Zhou, JY
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 40 - 52
  • [37] Practical Multi-Party Private Set Intersection Protocols
    Bay, Asli
    Erkin, Zekeriya
    Hoepman, Jaap-Henk
    Samardjiska, Simona
    Vos, Jelle
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1 - 15
  • [38] Exclusion-freeness in multi-party exchange protocols
    González-Deleito, N
    Markowitch, O
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 200 - 209
  • [39] Sound Multi-party Business Protocols for Service Networks
    Mancioppi, Michele
    Carro, Manuel
    van den Heuvel, Willem-Jan
    Papazoglou, Mike P.
    SERVICE-ORIENTED COMPUTING - ICSOC 2008, PROCEEDINGS, 2008, 5364 : 302 - +
  • [40] Improvement of Quantum Protocols for Secure Multi-Party Summation
    Gan, Zhi-Gang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (10) : 3086 - 3092