DocumentCode
180303
Title
Efficient multi-party computation with collusion-deterred secret sharing
Author
Zhaohong Wang ; Ying Luo ; Sen-ching Cheung
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Kentucky, Lexington, MA, USA
fYear
2014
fDate
4-9 May 2014
Firstpage
7401
Lastpage
7405
Abstract
Many secure multiparty computation (SMC) protocols use Shamir´s Secret Sharing (SSS) scheme as a building block. Unlike other cryptographic SMC techniques such as garbled circuits (GC), SSS requires no data expansion and achieves information theoretic security. A weakness of SSS is the possibility of collusion attacks from participants. In this paper, we propose an evolutionary game-theoretic (EGT) approach to deter collusion in SSS-based protocols. First, we consider the possibility of detecting the leak of secret data caused by collusion, devise an explicit retaliation mechanism, and show that the evolutionary stable strategy of this game is not to collude if the technology to detect the leakage of secret is readily available. Then, we consider the situation in which data-owners are unaware of the leakage and thereby unable to retaliate. Such behaviors are deterred by injecting occasional fake collusion requests, and detected by a censorship scheme that destroys subliminal communication. Comparison results show that our collusion-deterred SSS system significantly outperforms GC, while game simulations confirm the validity of our EGT framework on modeling collusion behaviors.
Keywords
cryptographic protocols; evolutionary computation; game theory; private key cryptography; EGT approach; GC; SMC protocols; SSS scheme; SSS-based protocols; Shamir secret sharing scheme; censorship scheme; collusion attacks; collusion-deterred SSS system; collusion-deterred secret sharing; cryptographic SMC techniques; evolutionary game-theoretic approach; evolutionary stable strategy; explicit retaliation mechanism; game simulations; garbled circuits; information theoretic security; occasional fake collusion requests; secure multiparty computation protocols; Computational efficiency; Cryptography; Games; Protocols; Sociology; Statistics; collusion; efficiency; multi-party computation;
fLanguage
English
Publisher
ieee
Conference_Titel
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
Conference_Location
Florence
Type
conf
DOI
10.1109/ICASSP.2014.6855038
Filename
6855038
Link To Document