EFFICIENT MULTI-PARTY COMPUTATION WITH COLLUSION-DETERRED SECRET SHARING

被引:0
|
作者
Wang, Zhaohong [1 ]
Luo, Ying [1 ]
Cheung, Sen-ching [1 ]
机构
[1] Univ Kentucky, Dept Elect & Comp Engn, Lexington, KY 40506 USA
关键词
multi-party computation; collusion; efficiency;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Many secure multiparty computation (SMC) protocols use Shamir's Secret Sharing (SSS) scheme as a building block. Unlike other cryptographic SMC techniques such as garbled circuits (GC), SSS requires no data expansion and achieves information theoretic security. A weakness of SSS is the possibility of collusion attacks from participants. In this paper, we propose an evolutionary game-theoretic (EGT) approach to deter collusion in SSS-based protocols. First, we consider the possibility of detecting the leak of secret data caused by collusion, devise an explicit retaliation mechanism, and show that the evolutionary stable strategy of this game is not to collude if the technology to detect the leakage of secret is readily available. Then, we consider the situation in which data-owners are unaware of the leakage and thereby unable to retaliate. Such behaviors are deterred by injecting occasional fake collusion requests, and detected by a censorship scheme that destroys subliminal communication. Comparison results show that our collusion-deterred SSS system significantly outperforms GC, while game simulations confirm the validity of our EGT framework on modeling collusion behaviors.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Multi-party computation with conversion of secret sharing
    Hossein Ghodosi
    Josef Pieprzyk
    Ron Steinfeld
    Designs, Codes and Cryptography, 2012, 62 : 259 - 272
  • [2] Multi-party computation with conversion of secret sharing
    Ghodosi, Hossein
    Pieprzyk, Josef
    Steinfeld, Ron
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 62 (03) : 259 - 272
  • [3] Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing
    Ohara, Kazuma
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2019, E102A (09) : 1079 - 1090
  • [4] Linear multi-secret sharing schemes based on multi-party computation
    Liu, Mulan
    Xiao, Liangliang
    Zhang, Zhifang
    FINITE FIELDS AND THEIR APPLICATIONS, 2006, 12 (04) : 704 - 713
  • [5] Batch Secret Sharing for Secure Multi-party Computation in Asynchronous Network
    黄征
    龚征
    李强
    JournalofShanghaiJiaotongUniversity(Science), 2009, 14 (01) : 112 - 116
  • [6] High efficient multi-party quantum secret sharing scheme
    Zhang, Xiaoqian
    Tan, Xiaoqing
    Liang, Cui
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 245 - 250
  • [7] Batch secret sharing for secure multi-party computation in asynchronous network
    Huang Z.
    Gong Z.
    Li Q.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (01) : 112 - 116
  • [8] Efficient multi-party quantum secret-sharing protocol
    Xin, Xiangjun
    He, Fan
    Qiu, Shujing
    Li, Chaoyang
    Li, Fagen
    CHINESE JOURNAL OF PHYSICS, 2024, 92 : 664 - 674
  • [9] Threshold quantum secret sharing between multi-party and multi-party
    YANG YuGuang1
    2 State Key Laboratory of Integrated Services Network
    3 State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences)
    4 State Key Laboratory of Networking and Switching Technology
    Science China(Physics,Mechanics & Astronomy), 2008, (09) : 1308 - 1315
  • [10] Threshold quantum secret sharing between multi-party and multi-party
    Yang YuGuang
    Wen QiaoYan
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2008, 51 (09): : 1308 - 1315