Application of Randomness for Security and Privacy in Multi-Party Computation

被引:2
|
作者
Saha, Rahul [1 ,2 ]
Kumar, Gulshan [1 ,2 ]
Geetha, G. [3 ]
Conti, Mauro [1 ]
Buchanan, William J. [4 ]
机构
[1] Univ Padua, Dept Math, I-35122 Padua, Italy
[2] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144001, Punjab, India
[3] Jain Univ, Sch Comp Sci & Informat Technol, Bengaluru 560069, Karnataka, India
[4] Edinburgh Napier Univ, Blockpass ID Lab, Edinburgh EH11 1PA, Scotland
关键词
Cryptography; Privacy; Information theory; Signal generators; Protocols; Mathematical models; Internet of Things; Computation; cryptography; function; information; multi-party; privacy; randomness; security; SECRET; GENERATOR;
D O I
10.1109/TDSC.2024.3381959
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A secure Multi-Party Computation (MPC) is one of the distributed computational methods, where it computes a function over the inputs given by more than one party jointly and keeps those inputs private from the parties involved in the process. Randomization in secret sharing leading to MPC is a requirement for privacy enhancements; however, most of the available MPC models use the trust assumptions of sharing and combining values. Thus, randomization in secret sharing and MPC modules is neglected. As a result, the available MPC models are prone to information leakage problems, where the models can reveal the partial values of the sharing secrets. In this paper, we propose the first model of utilizing a random function generator as an MPC primitive. More specifically, we analyze our previous development of the Symmetric Random Function Generator (SRFG) for information-theoretic security, where the system is considered to have unconditional security if it is secure against adversaries with unlimited computing resources and time. Further, we apply SRFG to eradicate the problem of information leakage in the general MPC model. Through a set of experiments, we show that SRFG is a function generator that can generate the combined functions (combination of logic GATEs) with $n/2$n/2 -private to $n$n-private norms. As the main goal of MPC is privacy preservation of the inputs, we analyze the applicability of SRFG properties in secret sharing and MPC and observe that SRFG is eligible to be a cryptographic primitive in MPCdevelopments. We also measure the performance of our proposed SRFG-based MPC framework with the other randomness generation-based MPC frameworks and analyze the comparative attributes with the state-of-the-art models. We observe that our posed SRFG-based MPC is $\approx 30\%$approximate to 30% better in terms of throughput and also shows 100% privacy attainment.
引用
收藏
页码:5694 / 5705
页数:12
相关论文
共 50 条
  • [41] Verifiable Private Multi-party Computation: Ranging and Ranking
    Zhang, Lan
    Li, Xiang-Yang
    Liu, Yunhao
    Jung, Taeho
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 605 - 609
  • [42] Resolving Multi-Party Privacy Conflicts in Social Media
    Such, Jose M.
    Criado, Natalia
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2016, 28 (07) : 1851 - 1863
  • [43] Secure Multi-Party Computation: Theory, practice and applications
    Zhao, Chuan
    Zhao, Shengnan
    Zhao, Minghao
    Chen, Zhenxiang
    Gao, Chong-Zhi
    Li, Hongwei
    Tan, Yu-an
    INFORMATION SCIENCES, 2019, 476 : 357 - 372
  • [44] Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits
    Genkin, Daniel
    Ishai, Yuval
    Polychroniadou, Antigoni
    Advances in Cryptology, Pt II, 2015, 9216 : 721 - 741
  • [45] SECURE MULTI-PARTY QUANTUM CONFERENCE AND XOR COMPUTATION
    Das, Nayana
    Paul, Goutam
    QUANTUM INFORMATION & COMPUTATION, 2021, 21 (3-4) : 203 - 232
  • [46] Incentive Mechanism for Privacy-Preserving Collaborative Routing Using Secure Multi-Party Computation and Blockchain
    Wang, Chaojie
    Peeta, Srinivas
    SENSORS, 2024, 24 (02)
  • [47] Efficient Coded Multi-Party Computation at Edge Networks
    Vedadi, Elahe
    Keshtkarjahromi, Yasaman
    Seferoglu, Hulya
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 807 - 820
  • [48] Outsourced privacy-preserving anomaly detection in time series of multi-party
    Zhang, Chunkai
    Zuo, Wei
    Yang, Peng
    Li, Ye
    Wang, Xuan
    CHINA COMMUNICATIONS, 2022, 19 (02) : 201 - 213
  • [49] SecureGPT: A Framework for Multi-Party Privacy-Preserving Transformer Inference in GPT
    Zeng, Chenkai
    He, Debiao
    Feng, Qi
    Yang, Xiaolin
    Luo, Qingcai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9480 - 9493
  • [50] Aegis: An Agent for Multi-party Privacy Preservation
    Ben Salem, Rim
    Aimeur, Esma
    Hage, Hicham
    PROCEEDINGS OF THE 2022 AAAI/ACM CONFERENCE ON AI, ETHICS, AND SOCIETY, AIES 2022, 2022, : 68 - 77