POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries

被引:1
|
作者
Zhu, Ruiyu [1 ]
Huang, Yan [1 ]
Cassel, Darion [2 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
scalable actively-secure computation;
D O I
10.1145/3133956.3134070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the problem of running a long-term on-demand service for executing actively-secure computations. We examined state-of-the-art tools and implementations for actively-secure computation and identified a set of key features indispensable to offer meaningful service like this. Since no satisfactory tools exist for the purpose, we developed Pool, a new tool for building and executing actively-secure computation protocols at extreme scales with nearly zero offline delay. With Pool, we are able to obliviously execute, for the first time, reactive computations like ORAM in the malicious threat model. Many technical benefits of Pool can be attributed to the concept of pool-based cut-and-choose. We show with experiments that this idea has significantly improved the scalability and usability of JIMU [38], a state-of-the-art LEGO protocol.
引用
收藏
页码:245 / 257
页数:13
相关论文
共 39 条
  • [21] Peer-to-peer secure multi-party numerical computation facing malicious adversaries
    Bickson, Danny
    Reinman, Tzachy
    Dolev, Danny
    Pinkas, Benny
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2010, 3 (02) : 129 - 144
  • [22] Peer-to-peer secure multi-party numerical computation facing malicious adversaries
    Danny Bickson
    Tzachy Reinman
    Danny Dolev
    Benny Pinkas
    Peer-to-Peer Networking and Applications, 2010, 3 : 129 - 144
  • [23] Network Agnostic Perfectly Secure Multiparty Computation Against General Adversaries
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2025, 71 (01) : 644 - 682
  • [24] A GMM-Based Secure State Estimation Approach against Dynamic Malicious Adversaries
    Zhu, Cui
    Wang, Zile
    Zang, Zeyuan
    Li, Yuxuan
    Zheng, Huanming
    JOURNAL OF SENSORS, 2022, 2022
  • [25] Secure and scalable aggregation in the smart grid resilient against malicious entities
    Dimitriou, Tassos
    Awad, Mohamad Khattar
    AD HOC NETWORKS, 2016, 50 : 58 - 67
  • [26] Post-quantum secure two-party computing protocols against malicious adversaries
    Huo, Yachao
    Zhao, Zongqu
    Qin, Panke
    Wang, Shujing
    Zheng, Chengfu
    Concurrency and Computation: Practice and Experience, 2024, 36 (04)
  • [27] Post-quantum secure two-party computing protocols against malicious adversaries
    Huo, Yachao
    Zhao, Zongqu
    Qin, Panke
    Wang, Shujing
    Zheng, Chengfu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (04):
  • [28] Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries
    Bassit, Amina
    Hahn, Florian
    Peeters, Joep
    Kevenaar, Tom
    Veldhuis, Raymond
    Peter, Andreas
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5045 - 5060
  • [29] Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 223 - 248
  • [30] Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries
    Pettai, Martin
    Laud, Peeter
    2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 75 - 89