Fairy Ring: Ubiquitous Secure Multiparty Computation Framework for Smartphone Applications

被引:0
|
作者
Teruya, Tadanori [1 ]
Aoki, Yoshiki [2 ]
Sakuina, Jun [3 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Informal Technol Res Inst, Koto Ku, AISI Tokyo Waterfront BioIT Res Bldg,2-4-7 Aomi, Tokyo, Japan
[2] DWANGO Co Ltd, Chuo Ku, KABUKIZA TOWER,4-12-15 Ginza, Tokyo, Japan
[3] Univ Tsukuba, Grad Sch Syst & Informat Engn, 1-1-1 Ten Nohdai, Tsukuba, Ibaraki, Japan
关键词
PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a framework for secure multiparty computation on smartphones. Our framework provides protocols, which are constructed by additively homomorphic encryption, to guarantee security against semi-honest adversaries without collusion. The protocols made using our framework follow a client-server model, thus users of our framework can easily and jointly execute these protocols as a service by accessing a server using their smartphones. Our framework provides four primitive protocols, and application protocols are constructed by using these primitive protocols. Consequently, our framework provides an environment that allows non-experts to easily use and develop smartphone applications of secure multiparty computation. To demonstrate the practicability of our framework, we implement and execute voting on 16 smartphones.
引用
下载
收藏
页码:708 / 712
页数:5
相关论文
共 50 条
  • [1] Practical applications of secure multiparty computation
    Talviste, Riivo
    Cryptology and Information Security Series, 2015, 13 : 246 - 251
  • [2] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468
  • [3] Key technologies and applications of secure multiparty computation
    Guo, X. (guoxiaoqiang@heuu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [4] A Management Framework for Secure Multiparty Computation in Dynamic Environments
    von Maltitz, Marcel
    Smarzly, Stefan
    Kinkelin, Holger
    Carle, Georg
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [5] Secure Multiparty Computation
    Lindell, Yehuda
    COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [6] Secure multiparty computation of solid geometric problems and their applications
    Li, Shundong
    Wu, Chunying
    Wang, Daoshun
    Dai, Yiqi
    INFORMATION SCIENCES, 2014, 282 : 401 - 413
  • [7] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [8] Secure multiparty computation of DNF
    Peng, Kun
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [9] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [10] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,