Incentive-driven attacker for corrupting two-party protocols

被引:0
|
作者
Wang, Yilei [1 ]
Metere, Roberto [2 ]
Zhou, Huiyu [3 ]
Cui, Guanghai [1 ]
Li, Tao [1 ]
机构
[1] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
[2] Newcastle Univ, Dept Comp Sci, Newcastle Upon Tyne, Tyne & Wear, England
[3] Univ Leicester, Dept Informat, Leicester, Leics, England
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金; 欧盟地平线“2020”;
关键词
Cost corruption; Incentive-driven adversary; Two-party computation; SECURE; ENCRYPTION; MECHANISM;
D O I
10.1007/s00500-018-3342-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversaries in two-party computation may sabotage a protocol, leading to possible collapse of the information security management. In practice, attackers often breach security protocols with specific incentives. For example, attackers manage to reap additional rewards by sabotaging computing tasks between two clouds. Unfortunately, most of the existing research works neglect this aspect when discussing the security of protocols. Furthermore, the construction of corrupting two parties is also missing in two-party computation. In this paper, we propose an incentive-driven attacking model where the attacker leverages corruption costs, benefits and possible consequences. We here formalize the utilities used for two-party protocols and the attacker(s), taking into account both corruption costs and attack benefits. Our proposed model can be considered as the extension of the seminal work presented by Groce and Katz (Annual international conference on the theory and applications of cryptographic techniques, Springer, Berlin, pp 81-98, 2012), while making significant contribution in addressing the corruption of two parties in two-party protocols. To the best of our knowledge, this is the first time to model the corruption of both parties in two-party protocols.
引用
收藏
页码:7733 / 7740
页数:8
相关论文
共 50 条
  • [1] Incentive-driven attacker for corrupting two-party protocols
    Yilei Wang
    Roberto Metere
    Huiyu Zhou
    Guanghai Cui
    Tao Li
    Soft Computing, 2018, 22 : 7733 - 7740
  • [2] Incentive-driven inattention
    Gaglianone, Wagner Piazza
    Giacomini, Raffaella
    Issler, Joao Victor
    Skreta, Vasiliki
    JOURNAL OF ECONOMETRICS, 2022, 231 (01) : 188 - 212
  • [3] Communication complexity in algebraic two-party protocols
    Ostrovsky, Rafail
    Skeith, William E., III
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 379 - +
  • [4] Adversarial Level Agreements for Two-Party Protocols
    George, Marilyn
    Kamara, Seny
    ASIA CCS'22: PROCEEDINGS OF THE 2022 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2022, : 816 - 830
  • [5] Certificateless authenticated two-party key agreement Protocols
    Mandt, Tarjei K.
    Tan, Chik How
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 37 - 44
  • [7] Secure Equality Testing Protocols in the Two-Party Setting
    Nateghizad, Majid
    Veugen, Thijs
    Erkin, Zekeriya
    Lagendijk, Reginald L.
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [8] Service-based synthesis of two-party protocols
    Kapus-Kolar, Monika
    Elektrotehniski Vestnik/Electrotechnical Review, 2000, 67 (3-4): : 161 - 168
  • [9] Secure two-party protocols for point inclusion problem
    Thomas, Tony
    International Journal of Network Security, 2009, 9 (01) : 1 - 7
  • [10] Pharmaceutical innovation is evolutionary and incentive-driven
    Bale, HE
    Azais, B
    BULLETIN OF THE WORLD HEALTH ORGANIZATION, 2004, 82 (10) : 788 - 789