151,708 research outputs found
Efficient secure comparison in the dishonest majority model
Secure comparison (SC) is an essential primitive in Secure Multiparty Computation (SMC) and a fundamental building block in Privacy-Preserving Data Analytics (PPDA). Although secure comparison has been studied since the introduction of SMC in the early 80s and many protocols have been proposed, there is still room for improvement, especially providing security against malicious adversaries who form the majority among the participating parties. It is not hard to develop an SC protocol secure against malicious majority based on the current state-of-the-art SPDZ framework. SPDZ is designed to work for arbitrary polynomially-bounded functionalities; it may not provide the most efficient SMC implementation for a specific task, such as SC. In this thesis, we propose a novel and efficient compiler specifically designed to convert most existing SC protocols with semi-honest security into the ones secure against the dishonest majority (malicious majority). We analyze the security of the proposed solutions using the real-ideal paradigm. Moreover, we provide computation and communication complexity analysis. Comparing to the current state-of-the-art SC protocols Rabbit and edaBits, our design offers significant performance gain. The empirical results show that the proposed solution is at least 5 and 10 times more efficient than Rabbit in run-time and communication cost respectively.Includes bibliographical references
Performance of various quantum key distribution systems using 1.55 um up-conversion single-photon detectors
We compare the performance of various quantum key distribution (QKD) systems
using a novel single-photon detector, which combines frequency up-conversion in
a periodically poled lithium niobate (PPLN) waveguide and a silicon avalanche
photodiode (APD). The comparison is based on the secure communication rate as a
function of distance for three QKD protocols: the Bennett-Brassard 1984 (BB84),
the Bennett, Brassard, and Mermin 1992 (BBM92), and the coherent differential
phase shift keying (DPSK). We show that the up-conversion detector allows for
higher communication rates and longer communication distances than the commonly
used InGaAs/InP APD for all the three QKD protocols.Comment: 9 pages, 9 figure
Security and performance comparison of different secure channel protocols for Avionics Wireless Networks
The notion of Integrated Modular Avionics (IMA) refers to inter-connected
pieces of avionics equipment supported by a wired technology, with stringent
reliability and safety requirements. If the inter-connecting wires are
physically secured so that a malicious user cannot access them directly, then
this enforces (at least partially) the security of the network. However,
substituting the wired network with a wireless network - which in this context
is referred to as an Avionics Wireless Network (AWN) - brings a number of new
challenges related to assurance, reliability, and security. The AWN thus has to
ensure that it provides at least the required security and safety levels
offered by the equivalent wired network. Providing a wired-equivalent security
for a communication channel requires the setting up of a strong, secure
(encrypted) channel between the entities that are connected to the AWN. In this
paper, we propose three approaches to establish such a secure channel based on
(i) pre-shared keys, (ii) trusted key distribution, and (iii) key-sharing
protocols. For each of these approaches, we present two representative protocol
variants. These protocols are then implemented as part of a demo AWN and they
are then compared based on performance measurements. Most importantly, we have
evaluated these protocols based on security and operational requirements that
we define in this paper for an AWN.Comment: 8 page, 4 images, 2 tables, conference, IEEE DAS
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model.
We describe efficient GC constructions for addition, subtraction, multiplication, and comparison functions. Our circuits for subtraction and comparison are approximately two times smaller (in terms of garbled tables) than previous constructions. This implies corresponding computation and communication improvements in SFE of functions using our efficient building blocks. The techniques rely on recently proposed ``free XOR\u27\u27 GC technique.
Further, we present concrete and detailed improved GC protocols
for the problem of secure integer comparison, and related
problems of auctions, minimum selection, and minimal distance.
Performance improvement comes both from building on
our efficient basic blocks and several problem-specific GC optimizations.
We provide precise cost evaluation of our constructions, which serves as a
baseline for future protocols
Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)
The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case
Combining Shamir & Additive Secret Sharing to Improve Efficiency of SMC Primitives Against Malicious Adversaries
Secure multi-party computation provides a wide array of protocols for
mutually distrustful parties be able to securely evaluate functions of private
inputs. Within recent years, many such protocols have been proposed
representing a plethora of strategies to securely and efficiently handle such
computation. These protocols have become increasingly efficient, but their
performance still is impractical in many settings. We propose new approaches to
some of these problems which are either more efficient than previous works
within the same security models or offer better security guarantees with
comparable efficiency. The goals of this research are to improve efficiency and
security of secure multi-party protocols and explore the application of such
approaches to novel threat scenarios. Some of the novel optimizations employed
are dynamically switching domains of shared secrets, asymmetric computations,
and advantageous functional transformations, among others. Specifically, this
work presents a novel combination of Shamir and Additive secret sharing to be
used in parallel which allows for the transformation of efficient protocols
secure against passive adversaries to be secure against active adversaries.
From this set of primitives we propose the construction of a comparison
protocol which can be implemented under that approach with a complexity which
is more efficient than other recent works for common domains of interest.
Finally, we present a system which addresses a critical security threat for the
protection and obfuscation of information which may be of high consequence.Comment: arXiv admin note: text overlap with arXiv:1810.0157
- …