Using Secure Multiparty Computation for Collaborative Information Exchange

被引:1
|
作者
Titze, Dennis [1 ]
Hofinger, Hans [1 ]
Schoo, Peter [1 ]
机构
[1] Fraunhofer Res Inst Appl & Integrated Secur AISEC, Garching, Germany
关键词
Anonymity; privacy; secure multiparty computation; collaborative information exchange;
D O I
10.1109/TrustCom.2013.214
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we describe an extension of the Secure Multiparty Computation (MPC) library SEPIA that allows mutual information exchange and distribution of warnings among a group of participating peers within an Information Sharing Network. This extension has been implemented and can be used to communicate security incident related data in an anonymous and privacy-preserving manner within IT early warning systems. More concrete: it allows for anonymous distribution of arbitrary binary input data to participating peers. It hence addresses several obstacles, e. g., concerning reputation loss, that are nowadays reasons for a reluctant attitude regarding information sharing across different administrative domains.
引用
收藏
页码:1717 / 1722
页数:6
相关论文
共 50 条
  • [41] A Scripting Language for Automating Secure Multiparty Computation
    Chen, Kung
    Hsu, Tsan-sheng
    Liau, Churn-Jung
    Wang, Da-Wei
    [J]. 2013 EIGHTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2013, : 127 - 134
  • [42] Secure Multiparty Quantum Computation for Summation and Multiplication
    Run-hua Shi
    Yi Mu
    Hong Zhong
    Jie Cui
    Shun Zhang
    [J]. Scientific Reports, 6
  • [43] Non-Interactive Secure Multiparty Computation
    Beimel, Amos
    Gabizon, Ariel
    Ishai, Yuval
    Kushilevitz, Eyal
    Meldgaard, Sigurd
    Paskin-Cherniaysky, Anat
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 387 - 404
  • [44] Privacy of Federated QR Decomposition Using Additive Secure Multiparty Computation
    Hartebrodt, Anne
    Rottger, Richard
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5122 - 5132
  • [45] Secure genome-wide association analysis using multiparty computation
    Cho, Hyunghoon
    Wu, David J.
    Berger, Bonnie
    [J]. NATURE BIOTECHNOLOGY, 2018, 36 (06) : 547 - +
  • [46] Proactive Secure Multiparty Computation with a Dishonest Majority
    Eldefrawy, Karim
    Ostrovsky, Rafail
    Park, Sunoo
    Yung, Moti
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2018, 2018, 11035 : 200 - 215
  • [47] Secure Multiparty RAM Computation in Constant Rounds
    Garg, Sanjam
    Gupta, Divya
    Miao, Peihan
    Pandey, Omkant
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 491 - 520
  • [48] Bit Decomposition Protocols in Secure Multiparty Computation
    Laud, Peeter
    Pankova, Alisa
    [J]. WAHC'18: PROCEEDINGS OF THE 6TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, 2018, : 37 - 48
  • [49] Leveraging Secure Multiparty Computation in the Internet of Things
    von Maltitz, Marcel
    Carle, Georg
    [J]. MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, 2018, : 508 - 510
  • [50] On 2-round secure multiparty computation
    Gennaro, R
    Ishai, Y
    Kushilevitz, E
    Rabin, T
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 178 - 193