Secure anonymous union computation among malicious partners

被引:0
|
作者
Boettcher, Stefan [1 ]
Obermeier, Sebastian [1 ]
机构
[1] Univ Gesamthsch Paderborn, Inst Comp Sci, Furstenalle 11, D-33102 Paderborn, Germany
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
When applications require a union calculation of different distributed datasets, two requirements are often necessary to fulfill: anonymity and security. Anonymity means for scenarios with more than 2 participants that the owner of a certain data item cannot be identified. Security means that no participant can prevent that data items of other participants will be included in the union set. In this paper we present a union protocol that guarantees both properties: anonymity and security even if participants act malicious, i.e. to modify messages or change the protocol. We prove the correctness of protocol and give experimental results that show the applicability of our protocol in a common environment.
引用
收藏
页码:128 / +
页数:3
相关论文
共 50 条
  • [41] SECURE COMPUTATION
    MICALI, S
    ROGAWAY, P
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 392 - 404
  • [42] Secure Exams despite Malicious Management
    Bella, Giampaolo
    Giustolisi, Rosario
    Lenzini, Gabriele
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 274 - 281
  • [43] Secure Aggregation Against Malicious Users
    Karakoc, Ferhat
    Onen, Melek
    Bilgin, Zeki
    PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 115 - 124
  • [44] Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT
    Ishai, Yuval
    Khurana, Dakshita
    Sahai, Amit
    Srinivasan, Akshayaram
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 441 - 469
  • [45] Research on the Harmfulness of Malicious Communication of Anonymous Internet Users
    Wang, Wei
    Wang, Li-Fang
    2018 3RD ANNUAL INTERNATIONAL CONFERENCE ON EDUCATION SCIENCE AND EDUCATION MANAGEMENT (ESEM 2018), 2018, : 299 - 303
  • [46] Secure Computation Protocol of Text Similarity against Malicious Attacks for Text Classification in Deep-Learning Technology
    Liu, Xin
    Wang, Ruxue
    Luo, Dan
    Xu, Gang
    Chen, Xiubo
    Xiong, Neal
    Liu, Xiaomeng
    ELECTRONICS, 2023, 12 (16)
  • [47] Secure Computing Protocols for Internet of Things Data Fusion Based on Set Intersection and Union Against Malicious Enemies
    Liu, Xin
    Wang, Ruxue
    Peng, Lu
    Luo, Dan
    Xu, Gang
    Chen, Xiu-Bo
    Xiong, Neal
    Liu, Xiaomeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 24918 - 24932
  • [48] Cloudbank: A Secure Anonymous Banking Cloud
    Sood, Ridhi
    Kalia, Meenakshi
    CONTEMPORARY COMPUTING, PT 1, 2010, 94 : 295 - 304
  • [49] Anonymous and secure electronic transaction protocol
    Brlek, S
    Hamadou, S
    Mullins, J
    ANNALS OF TELECOMMUNICATIONS, 2005, 60 (5-6) : 530 - 557
  • [50] Anonymous and secure electronic transaction protocol
    Brlek, Srecko
    Hamadou, Sardaouna
    Mullins, John
    Annales des Telecommunications/Annals of Telecommunications, 2005, 60 (5-6): : 530 - 557