• DocumentCode
    180303
  • Title

    Efficient multi-party computation with collusion-deterred secret sharing

  • Author

    Zhaohong Wang ; Ying Luo ; Sen-ching Cheung

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Kentucky, Lexington, MA, USA
  • fYear
    2014
  • fDate
    4-9 May 2014
  • Firstpage
    7401
  • Lastpage
    7405
  • Abstract
    Many secure multiparty computation (SMC) protocols use Shamir´s Secret Sharing (SSS) scheme as a building block. Unlike other cryptographic SMC techniques such as garbled circuits (GC), SSS requires no data expansion and achieves information theoretic security. A weakness of SSS is the possibility of collusion attacks from participants. In this paper, we propose an evolutionary game-theoretic (EGT) approach to deter collusion in SSS-based protocols. First, we consider the possibility of detecting the leak of secret data caused by collusion, devise an explicit retaliation mechanism, and show that the evolutionary stable strategy of this game is not to collude if the technology to detect the leakage of secret is readily available. Then, we consider the situation in which data-owners are unaware of the leakage and thereby unable to retaliate. Such behaviors are deterred by injecting occasional fake collusion requests, and detected by a censorship scheme that destroys subliminal communication. Comparison results show that our collusion-deterred SSS system significantly outperforms GC, while game simulations confirm the validity of our EGT framework on modeling collusion behaviors.
  • Keywords
    cryptographic protocols; evolutionary computation; game theory; private key cryptography; EGT approach; GC; SMC protocols; SSS scheme; SSS-based protocols; Shamir secret sharing scheme; censorship scheme; collusion attacks; collusion-deterred SSS system; collusion-deterred secret sharing; cryptographic SMC techniques; evolutionary game-theoretic approach; evolutionary stable strategy; explicit retaliation mechanism; game simulations; garbled circuits; information theoretic security; occasional fake collusion requests; secure multiparty computation protocols; Computational efficiency; Cryptography; Games; Protocols; Sociology; Statistics; collusion; efficiency; multi-party computation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
  • Conference_Location
    Florence
  • Type

    conf

  • DOI
    10.1109/ICASSP.2014.6855038
  • Filename
    6855038