EFFICIENT MULTI-PARTY COMPUTATION WITH COLLUSION-DETERRED SECRET SHARING

被引:0
|
作者
Wang, Zhaohong [1 ]
Luo, Ying [1 ]
Cheung, Sen-ching [1 ]
机构
[1] Univ Kentucky, Dept Elect & Comp Engn, Lexington, KY 40506 USA
关键词
multi-party computation; collusion; efficiency;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Many secure multiparty computation (SMC) protocols use Shamir's Secret Sharing (SSS) scheme as a building block. Unlike other cryptographic SMC techniques such as garbled circuits (GC), SSS requires no data expansion and achieves information theoretic security. A weakness of SSS is the possibility of collusion attacks from participants. In this paper, we propose an evolutionary game-theoretic (EGT) approach to deter collusion in SSS-based protocols. First, we consider the possibility of detecting the leak of secret data caused by collusion, devise an explicit retaliation mechanism, and show that the evolutionary stable strategy of this game is not to collude if the technology to detect the leakage of secret is readily available. Then, we consider the situation in which data-owners are unaware of the leakage and thereby unable to retaliate. Such behaviors are deterred by injecting occasional fake collusion requests, and detected by a censorship scheme that destroys subliminal communication. Comparison results show that our collusion-deterred SSS system significantly outperforms GC, while game simulations confirm the validity of our EGT framework on modeling collusion behaviors.
引用
收藏
页数:5
相关论文
共 50 条
  • [11] Threshold quantum secret sharing between multi-party and multi-party
    YuGuang Yang
    QiaoYan Wen
    Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51 : 1308 - 1315
  • [12] Parallel multi-party computation from linear multi-secret sharing schemes
    Zhang, ZF
    Liu, ML
    Xiao, LL
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 156 - 173
  • [13] Privacy Preserving Multi-Party Computation With Secret Sharing for Trajectory Prediction in VANETs
    Liu, Dengzhi
    Yu, Geng
    Ding, Yongdong
    Zhong, Zhaoman
    Wang, Chen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (12) : 18666 - 18677
  • [14] Dynamic Multi-Party to Multi-Party Quantum Secret Sharing based on Bell States
    Tian, Yuan
    Wang, Jialong
    Bian, Genqing
    Chang, Jinyong
    Li, Jian
    ADVANCED QUANTUM TECHNOLOGIES, 2024, 7 (07)
  • [15] An Electronic Voting Scheme Using Secure Multi-Party Computation Based on Secret Sharing
    Pu, Hongquan
    Cui, Zhe
    Liu, Ting
    International Journal of Network Security, 2021, 23 (06) : 997 - 1004
  • [16] On codes, matroids and secure multi-party computation from linear secret sharing schemes
    Cramer, R
    Daza, V
    Gracia, I
    Urroz, JJ
    Leander, G
    Martí-Farré, J
    Padró, C
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 327 - 343
  • [17] Multi-party computation enables secure polynomial control based solely on secret-sharing
    Schlor, Sebastian
    Hertneck, Michael
    Wildhagen, Stefan
    Allgower, Frank
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 4882 - 4887
  • [18] General secure multi-party computation from any linear secret-sharing scheme
    Cramer, R
    Damgård, I
    Maurer, U
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 316 - 334
  • [19] Secure multi-party computation with secret sharing for real-time data aggregation in IIoT
    Liu, Dengzhi
    Yu, Geng
    Zhong, Zhaoman
    Song, Yuanzhao
    COMPUTER COMMUNICATIONS, 2024, 224 : 159 - 168
  • [20] Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority
    Blanton, Marina
    Kang, Ahreum
    Yuan, Chen
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 : 377 - 397