Configurable security protocols for multi-party data analysis with malicious participants

被引:0
|
作者
Malin, B [1 ]
Airoldi, E [1 ]
Edoho-Eket, S [1 ]
Li, YH [1 ]
机构
[1] Carnegie Mellon Univ, Sch Comp Sci, Data Privacy Lab, Pittsburgh, PA 15213 USA
来源
ICDE 2005: 21ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS | 2005年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Standard multi-party computation models assume semi-honest behavior where the majority of participants implement protocols according to specification, an assumption not always plausible. In this paper we introduce a multiparty protocol for collaborative data analysis when participants are malicious and fail to follow specification. The protocol incorporates a semi-trusted third party, which analyzes encrypted data and provides honest responses that only intended recipients can successfully decrypt. The protocol incorporates data confidentiality by enabling participants to receive encrypted responses tailored to their own encrypted data submissions without revealing plaintext to other participants, including the third party. As opposed to previous models, trust need only be placed on a single participant with no data at stake. Additionally, the proposed protocol is configurable in a way that security features are controlled by independent subprotocols. Various combinations of subprotocols allow for a flexible security system, appropriate for a number of distributed data applications, such as secure list comparison.
引用
收藏
页码:533 / 544
页数:12
相关论文
共 50 条
  • [41] Information theoretic approach to privacy for multi-party protocols
    Satoh, T
    Kurosawa, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (01) : 79 - 84
  • [42] Game-based analysis of multi-party non-repudiation protocols
    Wang Xueming
    Li Xiang
    CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 642 - +
  • [43] Security analysis of a new multi-party payment protocol with intermediary service
    Carbonell, Mildrey
    Sierra, Jose Maria
    Torres, Joaquin
    Lzquierdo, Antonio
    DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 698 - +
  • [44] Brief Announcement: Towards Security and Privacy for Outsourced Data in the Multi-Party Setting
    Maffei, Matteo
    Malavolta, Giulio
    Reinert, Manuel
    Schroeder, Dominique
    PROCEEDINGS OF THE 2014 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC'14), 2014, : 144 - 146
  • [45] Multi-party trust computation in decentralized environments in the presence of malicious adversaries
    Dimitriou, Tassos
    Michalas, Antonis
    AD HOC NETWORKS, 2014, 15 : 53 - 66
  • [46] Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model
    Neugebauer, Georg
    Brutschy, Lucas
    Meyer, Ulrike
    Wetzel, Susanne
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 178 - 193
  • [47] Efficient Multi-Party Private Set Intersection Against Malicious Adversaries
    Zhang, En
    Liu, Feng-Hao
    Lai, Qiqi
    Jin, Ganggang
    Li, Yu
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 93 - 104
  • [48] Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting
    Wei, Lifei
    Liu, Jihai
    Zhang, Lei
    Zhang, Wuji
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 118 - 132
  • [49] The conceptualization of a configurable multi-party multi-message request-reply conversation
    Mulyar, Nataliya
    Aldred, Lachlan
    van der Aalst, Wil M. P.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPLS, DOA, ODBASE, GADA, AND IS, PT 1, PROCEEDINGS, 2007, 4803 : 735 - +
  • [50] Application of Randomness for Security and Privacy in Multi-Party Computation
    Saha, Rahul
    Kumar, Gulshan
    Geetha, G.
    Conti, Mauro
    Buchanan, William J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5694 - 5705