Fairy Ring: Ubiquitous Secure Multiparty Computation Framework for Smartphone Applications

被引:0
|
作者
Teruya, Tadanori [1 ]
Aoki, Yoshiki [2 ]
Sakuina, Jun [3 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Informal Technol Res Inst, Koto Ku, AISI Tokyo Waterfront BioIT Res Bldg,2-4-7 Aomi, Tokyo, Japan
[2] DWANGO Co Ltd, Chuo Ku, KABUKIZA TOWER,4-12-15 Ginza, Tokyo, Japan
[3] Univ Tsukuba, Grad Sch Syst & Informat Engn, 1-1-1 Ten Nohdai, Tsukuba, Ibaraki, Japan
关键词
PRIVACY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a framework for secure multiparty computation on smartphones. Our framework provides protocols, which are constructed by additively homomorphic encryption, to guarantee security against semi-honest adversaries without collusion. The protocols made using our framework follow a client-server model, thus users of our framework can easily and jointly execute these protocols as a service by accessing a server using their smartphones. Our framework provides four primitive protocols, and application protocols are constructed by using these primitive protocols. Consequently, our framework provides an environment that allows non-experts to easily use and develop smartphone applications of secure multiparty computation. To demonstrate the practicability of our framework, we implement and execute voting on 16 smartphones.
引用
下载
收藏
页码:708 / 712
页数:5
相关论文
共 50 条
  • [31] Basic constructions of secure multiparty computation
    Laud, Peeter
    Pankova, Alisa
    Kamm, Liina
    Veeningen, Meilof
    Cryptology and Information Security Series, 2015, 13 : 1 - 25
  • [32] Secure multiparty computation for comparator networks
    Morohashi, Gembu
    Chida, Koji
    Hirota, Keiichi
    Kikuchi, Hiroaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2349 - 2355
  • [33] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [34] Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
    Eriguchi, Reo
    Ichikawa, Atsunori
    Kunihiro, Noboru
    Nuida, Koji
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 271 - 290
  • [35] A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
    Toft, Tomas
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 20 - 33
  • [36] Secure multiparty computation of approximations - (Extended abstract)
    Feigenbaum, J
    Ishai, Y
    Malkin, T
    Nissim, K
    Strauss, MJ
    Wright, RN
    AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 927 - 938
  • [37] Multiparty Computation: To Secure Privacy, Do the Math
    Queue, 2023, 21 (06): : 78 - 100
  • [38] Oblivious array access for secure multiparty computation
    Laud, Peeter
    Cryptology and Information Security Series, 2015, 13 : 106 - 128
  • [39] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124
  • [40] Secure multiparty quantum computation with few qubits
    Lipinska, Victoria
    Ribeiro, Jeremy
    Wehner, Stephanie
    PHYSICAL REVIEW A, 2020, 102 (02)