POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries

被引:1
|
作者
Zhu, Ruiyu [1 ]
Huang, Yan [1 ]
Cassel, Darion [2 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
scalable actively-secure computation;
D O I
10.1145/3133956.3134070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the problem of running a long-term on-demand service for executing actively-secure computations. We examined state-of-the-art tools and implementations for actively-secure computation and identified a set of key features indispensable to offer meaningful service like this. Since no satisfactory tools exist for the purpose, we developed Pool, a new tool for building and executing actively-secure computation protocols at extreme scales with nearly zero offline delay. With Pool, we are able to obliviously execute, for the first time, reactive computations like ORAM in the malicious threat model. Many technical benefits of Pool can be attributed to the concept of pool-based cut-and-choose. We show with experiments that this idea has significantly improved the scalability and usability of JIMU [38], a state-of-the-art LEGO protocol.
引用
收藏
页码:245 / 257
页数:13
相关论文
共 39 条
  • [31] Providing scalable on-demand interactive video service by means of multicasting and client buffering
    Chan, SHG
    Chang, E
    2001 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-10, CONFERENCE RECORD, 2001, : 1607 - 1611
  • [32] Seraph: Towards Scalable and Efficient Fully-external Graph Computation via On-demand Processing
    Yang, Tsun-Yu
    Chen, Yizou
    Liang, Yuhong
    Yang, Ming-Chang
    PROCEEDINGS OF THE 22ND USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, FAST 24, 2024, : 373 - 387
  • [33] Seraph: Towards Scalable and Efficient Fully-external Graph Computation via On-demand Processing
    Yang, Tsun-Yu
    Chen, Yizou
    Liang, Yuhong
    Yang, Ming-Chang
    PROCEEDINGS OF THE 21ST USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, NSDI 24, 2024, : 373 - 387
  • [34] A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks
    Liu, Xin
    Kong, Jianwei
    Peng, Lu
    Luo, Dan
    Xu, Gang
    Chen, Xiubo
    Liu, Xiaomeng
    MATHEMATICS, 2023, 11 (23)
  • [35] PRYORTIE: Public on-demand smart transportation service via a scalable fog-based platform
    Ahmed, Naveed
    Baker, Thar
    Al Aghbari, Zaher
    Khedr, Ahmed
    INTELLIGENT SYSTEMS WITH APPLICATIONS, 2023, 18
  • [36] V2C: A Secure Vehicle to Cloud Framework for Virtualized and On-Demand Service Provisioning
    Rangarajan, Sathyanarayanan
    Verma, Monica
    Kannan, Anand
    Sharma, Ayush
    Schoen, Ingmar
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 148 - 154
  • [37] Secure Computation Protocol of Text Similarity against Malicious Attacks for Text Classification in Deep-Learning Technology
    Liu, Xin
    Wang, Ruxue
    Luo, Dan
    Xu, Gang
    Chen, Xiubo
    Xiong, Neal
    Liu, Xiaomeng
    ELECTRONICS, 2023, 12 (16)
  • [38] SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider
    Kumar, Mahender
    Chand, Satish
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (9-10) : 6163 - 6190
  • [39] SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider
    Mahender Kumar
    Satish Chand
    Multimedia Tools and Applications, 2020, 79 : 6163 - 6190