Cross-Domain Secure Computation

被引:0
|
作者
Cho, Chongwon [1 ]
Garg, Sanjam [2 ]
Ostrovsky, Rafail [3 ]
机构
[1] HRL Labs, Informat & Syst Sci Lab, Malibu, CA 90265 USA
[2] IBM Res T J Watson, Yorktown Hts, NY USA
[3] UCLA, Comp Sci Dept & Math Dept, Los Angeles, CA 90095 USA
来源
关键词
Multi-party computation; Concurrent security; CONCURRENT COMPOSITION; 2-PARTY COMPUTATION; LOWER BOUNDS; CRYPTOGRAPHY; COMPLETENESS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Consider the setting of two mutually distrustful parties Alice and Bob communicating over the Internet, who want to securely evaluate desired functions on their private inputs. In this setting all known protocols for securely evaluating general functions either require honest parties to trust an external party or provide only weaker notions of security. Thus, the question of minimizing or removing trusted set-up assumptions remains open. In this work, we introduce the cross-domain model (CD) for secure computation as a means to reducing the level of required trust. In this model, each domain consists of a set of mutually trusting parties along with a key-registration authority, where we would like parties from distinct domains to be able to perform multiple secure computation tasks concurrently. In this setting, we show the followings: Positive Construction for 2 domains: We give a multiparty-party protocol that concurrently and securely evaluates any function in the CD model with two domains, using only a constant number of rounds and relying only on standard assumptions. Impossibility Results for 3 or more domains: Consider a deterministic function (e. g., 1-out-of-2 bit OT) that Alice and Bob in the standalone setting cannot evaluate trivially and which allows only Bob to receive the output. In this setting if besides Alice and Bob there is a third party (such that all three are from distinct domains) then they cannot securely compute any such function in the CD model in concurrent setting even when their inputs are pre-specified. These results extend to the setting of multiple parties as well. In particular, there exists an n-party concurrently secure protocol in the CD model of n domains if and only if there are exactly n domains in the system.
引用
收藏
页码:650 / 668
页数:19
相关论文
共 50 条
  • [1] Secure cross-domain cookies for HTTP
    Rabinovich, Paul
    [J]. JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) : 1 - 12
  • [2] SECURE CROSS-DOMAIN TRAIN SCHEDULING
    Hartong, Mark
    Goel, Rajni
    Wijesekera, Duminda
    [J]. CRITICAL INFRASTRUCTURE PROTECTION III, 2009, 311 : 199 - 211
  • [3] A Cross-domain Optimal Path Computation
    Zhou, Bing
    Deng, Juan
    [J]. CURRENT TRENDS IN COMPUTER SCIENCE AND MECHANICAL AUTOMATION, VOL 1, 2017, : 315 - 321
  • [4] Efficient and adaptive secure cross-domain recommendations
    Liu, Hong
    He, Jian
    Xu, Zhu
    Zhang, Yushu
    Zhao, Zhiqiang
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 258
  • [5] Secure cross-domain positioning architecture for autonomic systems
    Pfeifer, T
    [J]. LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 507 - 508
  • [6] A Secure Cross-domain Access Control Scheme in Social Networks
    Fan, Kai
    Bai, Yuhan
    Xu, Huiyue
    Pan, Qiang
    Li, Hui
    Yang, Yintang
    [J]. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [7] Data Leakage Prevention for Secure Cross-Domain Information Exchange
    Kongsgard, Kyrre Wahl
    Nordbotten, Nils Agne
    Mancini, Federico
    Haakseth, Raymond
    Engelstad, Paal E.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (10) : 37 - 43
  • [8] A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication
    Hui Qi
    Peipei Li
    Chunbo Wang
    Jinlei Du
    Xiaoqiang Di
    [J]. Mobile Networks and Applications, 2023, 28 : 473 - 485
  • [9] A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication
    Qi, Hui
    Li, Peipei
    Wang, Chunbo
    Du, Jinlei
    Di, Xiaoqiang
    [J]. MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02): : 473 - 485
  • [10] Cross-Domain NER using Cross-Domain Language Modeling
    Jia, Chen
    Liang, Xiaobo
    Zhang, Yue
    [J]. 57TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2019), 2019, : 2464 - 2474