DocumentCode :
180303
Title :
Efficient multi-party computation with collusion-deterred secret sharing
Author :
Zhaohong Wang ; Ying Luo ; Sen-ching Cheung
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Kentucky, Lexington, MA, USA
fYear :
2014
fDate :
4-9 May 2014
Firstpage :
7401
Lastpage :
7405
Abstract :
Many secure multiparty computation (SMC) protocols use Shamir´s Secret Sharing (SSS) scheme as a building block. Unlike other cryptographic SMC techniques such as garbled circuits (GC), SSS requires no data expansion and achieves information theoretic security. A weakness of SSS is the possibility of collusion attacks from participants. In this paper, we propose an evolutionary game-theoretic (EGT) approach to deter collusion in SSS-based protocols. First, we consider the possibility of detecting the leak of secret data caused by collusion, devise an explicit retaliation mechanism, and show that the evolutionary stable strategy of this game is not to collude if the technology to detect the leakage of secret is readily available. Then, we consider the situation in which data-owners are unaware of the leakage and thereby unable to retaliate. Such behaviors are deterred by injecting occasional fake collusion requests, and detected by a censorship scheme that destroys subliminal communication. Comparison results show that our collusion-deterred SSS system significantly outperforms GC, while game simulations confirm the validity of our EGT framework on modeling collusion behaviors.
Keywords :
cryptographic protocols; evolutionary computation; game theory; private key cryptography; EGT approach; GC; SMC protocols; SSS scheme; SSS-based protocols; Shamir secret sharing scheme; censorship scheme; collusion attacks; collusion-deterred SSS system; collusion-deterred secret sharing; cryptographic SMC techniques; evolutionary game-theoretic approach; evolutionary stable strategy; explicit retaliation mechanism; game simulations; garbled circuits; information theoretic security; occasional fake collusion requests; secure multiparty computation protocols; Computational efficiency; Cryptography; Games; Protocols; Sociology; Statistics; collusion; efficiency; multi-party computation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on
Conference_Location :
Florence
Type :
conf
DOI :
10.1109/ICASSP.2014.6855038
Filename :
6855038
Link To Document :
بازگشت