Secure computation of common data among malicious partners

被引:0
作者
Obermeier, Sebastian [1 ]
Boettcher, Stefan [1 ]
机构
[1] Univ Gesamthsch Paderborn, D-33102 Paderborn, Germany
来源
SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2007年
关键词
Multiparty Computation; intersection; malicious behavior;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A secure calculation of common data (D-1 boolean AND...boolean AND D-n) of different participants without disclosing D-i is useful for many applications and has been studied as the Secure Multiparty Computation problem. However, proposed solutions assume all participants act '' semi-honest '', which means participants may neither alter the protocol execution nor fake database content. In this contribution, we focus on malicious participant behavior and prove that an atomic exchange of common data is not possible under the assumption of malicious participants. We propose a mechanism to calculate the intersection of multiple participants, which does not only reduce the disclosure in case participants cheat by altering the protocol to a negligible amount, it is also resistant against malicious participants that cooperate in order to cheat others. Furthermore, it impedes database content faking, which could be done when using other protocols by participants in order to check if data is contained in the other's databases. Last, we show experimentally the practical usability of our protocol and how the level of trust has an impact on the exchange speed of the intersection.
引用
收藏
页码:345 / 354
页数:10
相关论文
共 19 条
  • [1] Agrawal R, 2006, LECT NOTES COMPUT SC, V3896, P240
  • [2] Ajmani S., 2001, MITLCSTR847
  • [3] [Anonymous], P 2003 ACM SIGMOD IN, DOI DOI 10.1145/872757.872771
  • [4] Asynchronous protocols for optimistic fair exchange
    Asokan, N
    Shoup, V
    Waidner, M
    [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 86 - 99
  • [5] ASOKAN N, 1997, CCS, P7
  • [6] Böttcher S, 2006, LECT NOTES COMPUT SC, V4165, P18
  • [7] CLIFTON C, 2003, TOOLS PRIVACY PRESER
  • [8] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [9] Du W., 2001, P NEW SEC PAR WORKSH, P11
  • [10] A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS
    ELGAMAL, T
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) : 469 - 472