Application of Randomness for Security and Privacy in Multi-Party Computation

被引:2
|
作者
Saha, Rahul [1 ,2 ]
Kumar, Gulshan [1 ,2 ]
Geetha, G. [3 ]
Conti, Mauro [1 ]
Buchanan, William J. [4 ]
机构
[1] Univ Padua, Dept Math, I-35122 Padua, Italy
[2] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144001, Punjab, India
[3] Jain Univ, Sch Comp Sci & Informat Technol, Bengaluru 560069, Karnataka, India
[4] Edinburgh Napier Univ, Blockpass ID Lab, Edinburgh EH11 1PA, Scotland
关键词
Cryptography; Privacy; Information theory; Signal generators; Protocols; Mathematical models; Internet of Things; Computation; cryptography; function; information; multi-party; privacy; randomness; security; SECRET; GENERATOR;
D O I
10.1109/TDSC.2024.3381959
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secure Multi-Party Computation (MPC) is one of the distributed computational methods, where it computes a function over the inputs given by more than one party jointly and keeps those inputs private from the parties involved in the process. Randomization in secret sharing leading to MPC is a requirement for privacy enhancements; however, most of the available MPC models use the trust assumptions of sharing and combining values. Thus, randomization in secret sharing and MPC modules is neglected. As a result, the available MPC models are prone to information leakage problems, where the models can reveal the partial values of the sharing secrets. In this paper, we propose the first model of utilizing a random function generator as an MPC primitive. More specifically, we analyze our previous development of the Symmetric Random Function Generator (SRFG) for information-theoretic security, where the system is considered to have unconditional security if it is secure against adversaries with unlimited computing resources and time. Further, we apply SRFG to eradicate the problem of information leakage in the general MPC model. Through a set of experiments, we show that SRFG is a function generator that can generate the combined functions (combination of logic GATEs) with $n/2$n/2 -private to $n$n-private norms. As the main goal of MPC is privacy preservation of the inputs, we analyze the applicability of SRFG properties in secret sharing and MPC and observe that SRFG is eligible to be a cryptographic primitive in MPCdevelopments. We also measure the performance of our proposed SRFG-based MPC framework with the other randomness generation-based MPC frameworks and analyze the comparative attributes with the state-of-the-art models. We observe that our posed SRFG-based MPC is $\approx 30\%$approximate to 30% better in terms of throughput and also shows 100% privacy attainment.
引用
收藏
页码:5694 / 5705
页数:12
相关论文
共 50 条
  • [31] Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
    Yang, Bin
    Nakagawa, Hiroshi
    ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PT I, PROCEEDINGS, 2010, 6118 : 189 - +
  • [32] Privacy-Preserving Anti-money Laundering Using Secure Multi-party Computation
    van Egmond, Marie Beth
    Dunning, Vincent
    van den Berg, Stefan
    Rooijakkers, Thomas
    Sangers, Alex
    Poppe, Ton
    Veldsink, Jan
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2024, PT II, 2025, 14745 : 331 - 349
  • [33] SecureRC: A system for privacy-preserving relation classification using secure multi-party computation
    Gao, Chen
    Yu, Jia
    COMPUTERS & SECURITY, 2023, 128
  • [34] Identifying Privacy Weaknesses from Multi-party Trigger-Action Integration Platforms
    Mahadewa, Kulani
    Zhang, Yanjun
    Bai, Guangdong
    Bu, Lei
    Zuo, Zhiqiang
    Fernando, Dileepa
    Liang, Zhenkai
    Dong, Jin Song
    ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, : 2 - 15
  • [35] Privacy-preserving deep learning model with integer quantization and secure multi-party computation
    Tran, Anh-Tu
    Luong, The-Dung
    Pham, Xuan-Sang
    ANNALS OF OPERATIONS RESEARCH, 2024,
  • [36] Secure Multi-Party Computation-Based Privacy-Preserving Authentication for Smart Cities
    Sucasas, Victor
    Aly, Abdelrahaman
    Mantas, Georgios
    Rodriguez, Jonathan
    Aaraj, Najwa
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (04) : 3555 - 3572
  • [37] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [38] Multi-party trust computation in decentralized environments in the presence of malicious adversaries
    Dimitriou, Tassos
    Michalas, Antonis
    AD HOC NETWORKS, 2014, 15 : 53 - 66
  • [39] PPMLAC: High Performance Chipset Architecture for Secure Multi-Party Computation
    Zhou, Xing
    Xu, Zhilei
    Wang, Cong
    Gao, Mingyu
    PROCEEDINGS OF THE 2022 THE 49TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA '22), 2022, : 87 - 101
  • [40] Privacy-enhanced multi-party deep learning
    Gong, Maoguo
    Feng, Jialun
    Xie, Yu
    NEURAL NETWORKS, 2020, 121 : 484 - 496