Secure Distributed Membership Tests via Secret Sharing

被引:0
|
作者
Zage, David J. [1 ]
Xu, Helen [2 ]
Kroeger, Thomas M. [2 ]
Hahn, Bridger [2 ]
Donoghue, Nolan P. [2 ]
Benson, Thomas R. [3 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87123 USA
[2] Sandia Natl Labs, Livermore, CA 94550 USA
[3] Tufts Univ, Medford, MA 02155 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections based on problems assumed to be computationally hard. By contrast, data encoding methods such as secret sharing provide information-theoretic data protections. Archives that distribute data using secret sharing can provide data protections that are resilient to malicious insiders, compromised systems, and untrusted components. In this paper, we create the Serial Interpolation Filter, a method for storing and interacting with sets of data that are secured and distributed using secret sharing. We provide the ability to operate over set-oriented data distributed across multiple repositories without exposing the original data. Furthermore, we demonstrate the security of our method under various attacker models and provide protocol extensions to handle colluding attackers. The Serial Interpolation Filter provides information-theoretic protections from a single attacker and computationally hard protections from colluding attackers.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Secure image secret sharing over distributed cloud network
    Wu, Xiaotian
    Yang, Ching-Nung
    Li, Jian-Ming
    SIGNAL PROCESSING, 2021, 178
  • [2] Enabling Secure Secret Sharing in Distributed Online Social Networks
    Vu, Le-Hung
    Aberer, Karl
    Buchegger, Sonja
    Datta, Anwitaman
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 419 - +
  • [3] New secure distributed secret sharing scheme of n product
    Chen, Zhen-Hua
    Li, Shun-Dong
    Wang, Bao-Cang
    Li, Ji-Liang
    Liu, Xin
    Tongxin Xuebao/Journal on Communications, 2014, 35 (11): : 139 - 145
  • [4] Secure Computation with Preprocessing via Function Secret Sharing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    THEORY OF CRYPTOGRAPHY, TCC 2019, PT I, 2019, 11891 : 341 - 371
  • [5] Secret sharing with secure secret reconstruction
    Harn, Lein
    Xia, Zhe
    Hsu, Chingfang
    Liu, Yining
    INFORMATION SCIENCES, 2020, 519 : 1 - 8
  • [6] Secure Network Coding for Distributed Secret Sharing with Low Communication Cost
    Shah, Nihar B.
    Rashmi, K. V.
    Ramchandran, Kannan
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 2404 - 2408
  • [7] Secure Secret Sharing With Adaptive Bandwidth in Distributed Cloud Storage Systems
    Xiong, Hailiang
    Hu, Changwu
    Li, Yujun
    Wang, Guangyuan
    Zhou, Hongchao
    IEEE ACCESS, 2020, 8 : 108148 - 108157
  • [8] Secure Secret Sharing in the Cloud
    Chang, Ching-Chun
    Li, Chang-Tsun
    2017 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2017, : 358 - 361
  • [9] Secret Sharing: Secure Password Sharing Technique
    Vyas, Hardik A.
    2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 731 - 735
  • [10] Distributed Transmission for Secure Wireless Links Based on a Secret-Sharing Method
    Yamanaka, Masaaki
    Wei, ShenCong
    Zou, Jingbo
    Ohno, Shuichi
    Miyamoto, Shinichi
    Sampei, Seiichi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2019, E102B (12) : 2286 - 2296