Secure Distributed Membership Tests via Secret Sharing

被引:0
|
作者
Zage, David J. [1 ]
Xu, Helen [2 ]
Kroeger, Thomas M. [2 ]
Hahn, Bridger [2 ]
Donoghue, Nolan P. [2 ]
Benson, Thomas R. [3 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87123 USA
[2] Sandia Natl Labs, Livermore, CA 94550 USA
[3] Tufts Univ, Medford, MA 02155 USA
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC) | 2016年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections based on problems assumed to be computationally hard. By contrast, data encoding methods such as secret sharing provide information-theoretic data protections. Archives that distribute data using secret sharing can provide data protections that are resilient to malicious insiders, compromised systems, and untrusted components. In this paper, we create the Serial Interpolation Filter, a method for storing and interacting with sets of data that are secured and distributed using secret sharing. We provide the ability to operate over set-oriented data distributed across multiple repositories without exposing the original data. Furthermore, we demonstrate the security of our method under various attacker models and provide protocol extensions to handle colluding attackers. The Serial Interpolation Filter provides information-theoretic protections from a single attacker and computationally hard protections from colluding attackers.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A Verifiable Secret Sharing Approach for Secure MultiCloud Storage
    Benzekki, Kamal
    El Fergougui, Abdeslam
    Elalaoui, Abdelbaki Elbelrhiti
    UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 225 - 234
  • [42] Secure secret reconstruction and multi-secret sharing schemes with unconditional security
    Harn, Lein
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 567 - 573
  • [43] A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY
    Ul Ain, Noor
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND DIGITAL SYSTEMS (C-CODE), 2017, : 112 - 116
  • [44] A forward-secure scheme based on secret sharing
    Zhang, Jing
    Wei, Feng
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138
  • [45] Lightweight, Maliciously Secure Verifiable Function Secret Sharing
    de Castro, Leo
    Polychroniadou, Anitgoni
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 150 - 179
  • [46] Multiparty quantum secret sharing of secure direct communication
    Zhang, ZJ
    PHYSICS LETTERS A, 2005, 342 (1-2) : 60 - 66
  • [47] A Secure Threshold Secret Sharing Framework for Database Outsourcing
    Pathak, Ajeet Ram
    Padmavathi, B.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 1642 - 1649
  • [48] A Secure Visual Secret Checking of Meaningful Sharing Images
    Chen, Chin-Ling
    Chen, Wen-Hu
    Chen, Chih-Cheng
    Lai, Yeong-Lin
    Tseng, Kuo-Kun
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (05): : 2327 - 2335
  • [49] Efficient and secure quantum secret sharing for eight users
    Qin, Yue
    Cheng, Jialin
    Ma, Jingxu
    Zhao, Di
    Yan, Zhihui
    Jia, Xiaojun
    Xie, Changde
    Peng, Kunchi
    PHYSICAL REVIEW RESEARCH, 2024, 6 (03):
  • [50] Threshold Quantum Secret Sharing of Secure Direct Communication
    Li Bao-Kui
    Yang Yu-Guang
    Wen Qiao-Yan
    CHINESE PHYSICS LETTERS, 2009, 26 (01)