Secure Distributed Membership Tests via Secret Sharing

被引:0
|
作者
Zage, David J. [1 ]
Xu, Helen [2 ]
Kroeger, Thomas M. [2 ]
Hahn, Bridger [2 ]
Donoghue, Nolan P. [2 ]
Benson, Thomas R. [3 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87123 USA
[2] Sandia Natl Labs, Livermore, CA 94550 USA
[3] Tufts Univ, Medford, MA 02155 USA
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC) | 2016年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections based on problems assumed to be computationally hard. By contrast, data encoding methods such as secret sharing provide information-theoretic data protections. Archives that distribute data using secret sharing can provide data protections that are resilient to malicious insiders, compromised systems, and untrusted components. In this paper, we create the Serial Interpolation Filter, a method for storing and interacting with sets of data that are secured and distributed using secret sharing. We provide the ability to operate over set-oriented data distributed across multiple repositories without exposing the original data. Furthermore, we demonstrate the security of our method under various attacker models and provide protocol extensions to handle colluding attackers. The Serial Interpolation Filter provides information-theoretic protections from a single attacker and computationally hard protections from colluding attackers.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] The Prospects of Quantum Secure Communication for Secret Sharing
    Chou, Yao-Hsin
    Tseng, Kuo-Chun
    Kuo, Shu-Yu
    Kuo, Sy-Yen
    Sheu, Bing
    IEEE NANOTECHNOLOGY MAGAZINE, 2023, 17 (02) : 38 - 44
  • [32] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [33] Improved Protocols for Distributed Secret Sharing
    De Prisco, Roberto
    De Santis, Alfredo
    Palmieri, Francesco
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3558 - 3571
  • [34] Unconditional Secure Topology-hiding Broadcast Via Shamir's Secret Sharing
    Bo Mi
    Wu, Bingqing
    Kuang, Fengtian
    Huang darong
    Wu, Shijie
    Lin, Mengting
    PROCEEDINGS OF 2020 IEEE 9TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE (DDCLS'20), 2020, : 679 - 683
  • [35] Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes
    Bitar, Rawad
    Parag, Parimal
    El Rouayheb, Salim
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (08) : 4609 - 4619
  • [36] Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
    Eriguchi, Reo
    Kunihiro, Noboru
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 264 - 268
  • [37] Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage
    Hayashi, Masahito
    Koshiba, Takeshi
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (01) : 253 - 267
  • [38] Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
    Dowsley, Rafael
    Mueller-Quade, Joern
    Otsuka, Akira
    Hanaoka, Goichiro
    Imai, Hideki
    Nascimento, Anderson C. A.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (02) : 725 - 734
  • [39] Provably Secure On-Line Secret Sharing Scheme
    Oba, Tatsumi
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 139 - 149
  • [40] Secure and Optimal Secret Sharing Scheme for Color Images
    Shankar, K.
    Taniar, David
    Yang, Eunmok
    Yi, Okyeon
    MATHEMATICS, 2021, 9 (19)