Secure Distributed Membership Tests via Secret Sharing

被引:0
|
作者
Zage, David J. [1 ]
Xu, Helen [2 ]
Kroeger, Thomas M. [2 ]
Hahn, Bridger [2 ]
Donoghue, Nolan P. [2 ]
Benson, Thomas R. [3 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87123 USA
[2] Sandia Natl Labs, Livermore, CA 94550 USA
[3] Tufts Univ, Medford, MA 02155 USA
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC) | 2016年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections based on problems assumed to be computationally hard. By contrast, data encoding methods such as secret sharing provide information-theoretic data protections. Archives that distribute data using secret sharing can provide data protections that are resilient to malicious insiders, compromised systems, and untrusted components. In this paper, we create the Serial Interpolation Filter, a method for storing and interacting with sets of data that are secured and distributed using secret sharing. We provide the ability to operate over set-oriented data distributed across multiple repositories without exposing the original data. Furthermore, we demonstrate the security of our method under various attacker models and provide protocol extensions to handle colluding attackers. The Serial Interpolation Filter provides information-theoretic protections from a single attacker and computationally hard protections from colluding attackers.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Secure Collaborative Editing Using Secret Sharing
    Arora, Shashank
    Atrey, Pradeep K.
    2021 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2021, : 128 - 133
  • [22] Secure group key agreement protocol with elliptic curve secret sharing for authentication in distributed environments
    Sairise, Raju M.
    Limkar, Suresh
    Deokate, Sarika T.
    Shirkande, Shrinivas T.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1569 - 1583
  • [23] Unconditionally secure social secret sharing scheme
    Nojoumian, M.
    Stinson, D. R.
    Grainger, M.
    IET INFORMATION SECURITY, 2010, 4 (04) : 202 - 211
  • [24] Quantum strongly secure ramp secret sharing
    Paul Zhang
    Ryutaroh Matsumoto
    Quantum Information Processing, 2015, 14 : 715 - 729
  • [25] Strongly secure ramp secret sharing schemes
    Iwamoto, M
    Yamamoto, H
    2005 IEEE International Symposium on Information Theory (ISIT), Vols 1 and 2, 2005, : 1221 - 1225
  • [26] Quantum strongly secure ramp secret sharing
    Zhang, Paul
    Matsumoto, Ryutaroh
    QUANTUM INFORMATION PROCESSING, 2015, 14 (02) : 715 - 729
  • [27] Quantum states for perfectly secure secret sharing
    Chi, Dong Pyo
    Choi, Jeong Woon
    Kim, Jeong San
    Kim, Taewan
    Lee, Soojoon
    PHYSICAL REVIEW A, 2008, 78 (01):
  • [28] Secure Social Recommendation Based on Secret Sharing
    Chen, Chaochao
    Li, Liang
    Wu, Bingzhe
    Hong, Cheng
    Wang, Li
    Zhou, Jun
    ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 : 506 - 512
  • [29] Weakly Secure Visual Secret Sharing Schemes
    Iwamoto, Mitsugu
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 41 - 46
  • [30] Secret Sharing in the Encrypted Domain with Secure Comparison
    Zhao, Bin
    Delp, Edward J.
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,