Incentive-driven attacker for corrupting two-party protocols

被引:0
|
作者
Wang, Yilei [1 ]
Metere, Roberto [2 ]
Zhou, Huiyu [3 ]
Cui, Guanghai [1 ]
Li, Tao [1 ]
机构
[1] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
[2] Newcastle Univ, Dept Comp Sci, Newcastle Upon Tyne, Tyne & Wear, England
[3] Univ Leicester, Dept Informat, Leicester, Leics, England
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金; 欧盟地平线“2020”;
关键词
Cost corruption; Incentive-driven adversary; Two-party computation; SECURE; ENCRYPTION; MECHANISM;
D O I
10.1007/s00500-018-3342-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversaries in two-party computation may sabotage a protocol, leading to possible collapse of the information security management. In practice, attackers often breach security protocols with specific incentives. For example, attackers manage to reap additional rewards by sabotaging computing tasks between two clouds. Unfortunately, most of the existing research works neglect this aspect when discussing the security of protocols. Furthermore, the construction of corrupting two parties is also missing in two-party computation. In this paper, we propose an incentive-driven attacking model where the attacker leverages corruption costs, benefits and possible consequences. We here formalize the utilities used for two-party protocols and the attacker(s), taking into account both corruption costs and attack benefits. Our proposed model can be considered as the extension of the seminal work presented by Groce and Katz (Annual international conference on the theory and applications of cryptographic techniques, Springer, Berlin, pp 81-98, 2012), while making significant contribution in addressing the corruption of two parties in two-party protocols. To the best of our knowledge, this is the first time to model the corruption of both parties in two-party protocols.
引用
收藏
页码:7733 / 7740
页数:8
相关论文
共 50 条
  • [21] Convergence of Incentive-Driven Dynamics in Fisher Markets
    Dvijotham, Krishnamurthy
    Rabani, Yuval
    Sehulman, Leonard J.
    PROCEEDINGS OF THE TWENTY-EIGHTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, 2017, : 554 - 567
  • [22] Incentive-Driven Energy Trading in the Smart Grid
    Zhang, Ke
    Mao, Yuming
    Leng, Supeng
    Maharjan, Sabita
    Zhang, Yan
    Vinel, Alexey
    Jonsson, Magnus
    IEEE ACCESS, 2016, 4 : 1243 - 1257
  • [23] Convergence of incentive-driven dynamics in Fisher markets
    Dvijotham, Krishnamurthy
    Rabani, Yuval
    Schulman, Leonard J.
    GAMES AND ECONOMIC BEHAVIOR, 2022, 134 : 361 - 375
  • [24] Incentive-driven QoS for Ephemeral Virtual Clouds
    Raj, Arun
    Bulakh, Abhinay
    Kumar, Santosh
    Dharanipragada, Janakiram
    2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 571 - 576
  • [25] the effectiveness of incentive-driven role-play
    Dingli, Sophia
    Khalfey, Sameera
    Leston-bandeira, Cristina
    EUROPEAN POLITICAL SCIENCE, 2013, 12 (03) : 384 - 398
  • [26] Incentive-driven Edge Cooperation for Service Provision
    Chen, Yishan
    Deng, Shuiguang
    Yin, Jianwei
    2021 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2021, 2021, : 588 - 597
  • [27] The Effectiveness of Incentive-Driven Role-Play
    sophia dingli
    sameera khalfey
    cristina leston-bandeira
    European Political Science, 2013, 12 : 384 - 398
  • [28] COMPUTATIONAL TWO-PARTY CORRELATION: A DICHOTOMY FOR KEY-AGREEMENT PROTOCOLS
    Haitner, Iftach
    Nissim, Kobbi
    Omri, Eran
    Shaltiel, Ronen
    Silbak, Jad
    SIAM JOURNAL ON COMPUTING, 2020, 49 (06) : 1041 - 1082
  • [29] Extended KCI attack against two-party key establishment protocols
    Tang, Qiang
    Chen, Liqun
    INFORMATION PROCESSING LETTERS, 2011, 111 (15) : 744 - 747
  • [30] Common program analysis of two-party security protocols using SMV
    Zhang, YQ
    Jia, SP
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 923 - 930