Incentive-driven attacker for corrupting two-party protocols

被引:0
|
作者
Wang, Yilei [1 ]
Metere, Roberto [2 ]
Zhou, Huiyu [3 ]
Cui, Guanghai [1 ]
Li, Tao [1 ]
机构
[1] Ludong Univ, Sch Informat & Elect Engn, Yantai, Peoples R China
[2] Newcastle Univ, Dept Comp Sci, Newcastle Upon Tyne, Tyne & Wear, England
[3] Univ Leicester, Dept Informat, Leicester, Leics, England
基金
英国工程与自然科学研究理事会; 中国国家自然科学基金; 欧盟地平线“2020”;
关键词
Cost corruption; Incentive-driven adversary; Two-party computation; SECURE; ENCRYPTION; MECHANISM;
D O I
10.1007/s00500-018-3342-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Adversaries in two-party computation may sabotage a protocol, leading to possible collapse of the information security management. In practice, attackers often breach security protocols with specific incentives. For example, attackers manage to reap additional rewards by sabotaging computing tasks between two clouds. Unfortunately, most of the existing research works neglect this aspect when discussing the security of protocols. Furthermore, the construction of corrupting two parties is also missing in two-party computation. In this paper, we propose an incentive-driven attacking model where the attacker leverages corruption costs, benefits and possible consequences. We here formalize the utilities used for two-party protocols and the attacker(s), taking into account both corruption costs and attack benefits. Our proposed model can be considered as the extension of the seminal work presented by Groce and Katz (Annual international conference on the theory and applications of cryptographic techniques, Springer, Berlin, pp 81-98, 2012), while making significant contribution in addressing the corruption of two parties in two-party protocols. To the best of our knowledge, this is the first time to model the corruption of both parties in two-party protocols.
引用
收藏
页码:7733 / 7740
页数:8
相关论文
共 50 条
  • [41] A TWO-PARTY SOUTH?
    Heberle, Rudolf
    SOCIAL FORCES, 1952, 31 (01) : 84 - 85
  • [42] Incentive-Driven Approach for Misbehavior Avoidance in Vehicular Networks
    Sultan, Shahid
    Javaid, Qaisar
    Rehman, Eid
    Alahmadi, Ahmad Aziz
    Ullah, Nasim
    Khan, Wakeel
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 6089 - 6106
  • [43] Optimal Incentive-driven Design of Participatory Sensing Systems
    Koutsopoulos, Iordanis
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 1402 - 1410
  • [44] Reliability Model for Incentive-Driven IoT Energy Services
    Abu Safia, Amani
    Bouguettaya, Athman
    PROCEEDINGS OF THE 17TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2020), 2021, : 196 - 205
  • [45] A Two-Party South?
    Greene, Lee S.
    ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 1952, 283 : 193 - 193
  • [46] A Two-Party South?
    Carlisle, Douglas
    JOURNAL OF POLITICS, 1952, 14 (04): : 730 - 731
  • [47] Two-party system
    Rajeev, PV
    ECONOMIC AND POLITICAL WEEKLY, 2000, 35 (1-2) : 72 - 72
  • [48] Two improved two-party identity-based authenticated key agreement protocols
    Holbl, Marko
    Welzer, Tatjana
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1056 - 1060
  • [49] Fast two-party signature for upgrading ECDSA to two-party scenario easily
    Tu, Binbin
    Chen, Yu
    Cui, Hongrui
    Wang, Xianfang
    THEORETICAL COMPUTER SCIENCE, 2024, 986
  • [50] Two-party quantum key agreement protocols under collective noise channel
    Hao Gao
    Xiao-Guang Chen
    Song-Rong Qian
    Quantum Information Processing, 2018, 17