Secure anonymous union computation among malicious partners

被引:0
|
作者
Boettcher, Stefan [1 ]
Obermeier, Sebastian [1 ]
机构
[1] Univ Gesamthsch Paderborn, Inst Comp Sci, Furstenalle 11, D-33102 Paderborn, Germany
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When applications require a union calculation of different distributed datasets, two requirements are often necessary to fulfill: anonymity and security. Anonymity means for scenarios with more than 2 participants that the owner of a certain data item cannot be identified. Security means that no participant can prevent that data items of other participants will be included in the union set. In this paper we present a union protocol that guarantees both properties: anonymity and security even if participants act malicious, i.e. to modify messages or change the protocol. We prove the correctness of protocol and give experimental results that show the applicability of our protocol in a common environment.
引用
收藏
页码:128 / +
页数:3
相关论文
共 50 条
  • [31] A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks
    Liu, Xin
    Kong, Jianwei
    Peng, Lu
    Luo, Dan
    Xu, Gang
    Chen, Xiubo
    Liu, Xiaomeng
    MATHEMATICS, 2023, 11 (23)
  • [32] Zero knowledge proof for secure two-party computation with malicious adversaries in distributed networks
    Yang, Xiaoyi
    Huang, Meijuan
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (04) : 441 - 450
  • [33] High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
    Furukawa, Jun
    Lindell, Yehuda
    Nof, Ariel
    Weinstein, Or
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 225 - 255
  • [34] Peer-to-peer secure multi-party numerical computation facing malicious adversaries
    Bickson, Danny
    Reinman, Tzachy
    Dolev, Danny
    Pinkas, Benny
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2010, 3 (02) : 129 - 144
  • [35] Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security
    Dalskov, Anders
    Escudero, Daniel
    Keller, Marcel
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2183 - 2200
  • [36] Peer-to-peer secure multi-party numerical computation facing malicious adversaries
    Danny Bickson
    Tzachy Reinman
    Danny Dolev
    Benny Pinkas
    Peer-to-Peer Networking and Applications, 2010, 3 : 129 - 144
  • [37] Anonymous voting using distributed ledger-assisted secure multi-party computation
    Schiedermeier, Maximilian
    Hasan, Omar
    Mayer, Tobias
    Brunie, Lionel
    Kosch, Harald
    APPLIED NETWORK SCIENCE, 2024, 9 (01)
  • [38] Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets
    Zhang L.
    He C.
    Wei L.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2286 - 2298
  • [39] Anonymous and secure multicast subscription
    Ray, I
    Ray, I
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 313 - 327
  • [40] Secure and anonymous multicast framework
    Weiler, N
    Plattner, B
    COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 39 - 51