354 research outputs found
Instantaneous Decentralized Poker
We present efficient protocols for amortized secure multiparty computation
with penalties and secure cash distribution, of which poker is a prime example.
Our protocols have an initial phase where the parties interact with a
cryptocurrency network, that then enables them to interact only among
themselves over the course of playing many poker games in which money changes
hands.
The high efficiency of our protocols is achieved by harnessing the power of
stateful contracts. Compared to the limited expressive power of Bitcoin
scripts, stateful contracts enable richer forms of interaction between standard
secure computation and a cryptocurrency.
We formalize the stateful contract model and the security notions that our
protocols accomplish, and provide proofs using the simulation paradigm.
Moreover, we provide a reference implementation in Ethereum/Solidity for the
stateful contracts that our protocols are based on.
We also adopt our off-chain cash distribution protocols to the special case
of stateful duplex micropayment channels, which are of independent interest. In
comparison to Bitcoin based payment channels, our duplex channel implementation
is more efficient and has additional features
Statistically-secure ORAM with Overhead
We demonstrate a simple, statistically secure, ORAM with computational
overhead ; previous ORAM protocols achieve only
computational security (under computational assumptions) or require
overheard. An additional benefit of our ORAM is its
conceptual simplicity, which makes it easy to implement in both software and
(commercially available) hardware.
Our construction is based on recent ORAM constructions due to Shi, Chan,
Stefanov, and Li (Asiacrypt 2011) and Stefanov and Shi (ArXiv 2012), but with
some crucial modifications in the algorithm that simplifies the ORAM and enable
our analysis. A central component in our analysis is reducing the analysis of
our algorithm to a "supermarket" problem; of independent interest (and of
importance to our analysis,) we provide an upper bound on the rate of "upset"
customers in the "supermarket" problem
Privacy Enhanced Access Control for Outsourced Data Sharing
Traditional access control models often assume that the entity enforcing access control policies is also the owner of data and resources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving confidentiality of stored data from unauthorized access and the storage provider. However, in this setting, access control policies as well as users' access patterns also become privacy sensitive information that should be protected from the cloud. We propose a two-level access control scheme that combines coarse-grained access control enforced at the cloud, which allows to get acceptable communication overhead and at the same time limits the information that the cloud learns from his partial view of the access rules and the access patterns, and fine-grained cryptographic access control enforced at the user's side, which provides the desired expressiveness of the access control policies. Our solution handles both read and write access control
Exploring Coral Calcification by Calcium Carbonate Overgrowth Experiments
The Scleractinia coral biomineralization process is a representative example of a heterogeneous process of nudeation and growth of biogenic CaCO3 over a mineral phase. Indeed, even if the biomineralization process starts before settlement, the bulk formation of the skeleton takes place only when the larvae attach to a solid substrate, which can be Mg-calcite from coralline algae, and the following growth proceeds on the Mg-calcite surface of the formed baseplate of the planula. Despite this peculiarity and central role of the Mg-calcite substrate, the in vitro overgrowth of CaCO3 on single crystals of Mg-calcite, or calcite, in the presence of magnesium ions and the soluble organic matrix (SOM) extracted from coral skeletons has not been performed until now. In this study, the SOMs from Stylophora pistillata and Oculina patagonica skeletons were used in a set of overgrowth experiments. The overgrown CaCO3 was characterized by microscopic, diffractometric, and spectroscopic techniques. Our results showed that CaCO3 overgrowth in the presence of S. pistillata or O. patagonica SOM produces different effects. However, there appears to be a minor distinction between samples when magnesium ions are present in solution. Moreover, the Mg-calcite substrate appears to be a favorable substrate for the overgrowth of aragonite, differently from calcite. These observations fit with the observed settling of coral larvae on Mg-calcite-based substrates and with the in vivo observation that in the planula aragonite forms on first-formed Mg-calcite crystals. The overall results of this study highlight the importance of magnesium ions, either in the solution or in the substrate, in defining the shape, morphology, and polymorphism of biodeposited CaCO3. They also suggest a magnesium-dependent biological control on the deposition of coral skeletons
Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries
We propose an efficient framework for enabling secure multi-party numerical
computations in a Peer-to-Peer network. This problem arises in a range of
applications such as collaborative filtering, distributed computation of trust
and reputation, monitoring and other tasks, where the computing nodes is
expected to preserve the privacy of their inputs while performing a joint
computation of a certain function. Although there is a rich literature in the
field of distributed systems security concerning secure multi-party
computation, in practice it is hard to deploy those methods in very large scale
Peer-to-Peer networks. In this work, we try to bridge the gap between
theoretical algorithms in the security domain, and a practical Peer-to-Peer
deployment.
We consider two security models. The first is the semi-honest model where
peers correctly follow the protocol, but try to reveal private information. We
provide three possible schemes for secure multi-party numerical computation for
this model and identify a single light-weight scheme which outperforms the
others. Using extensive simulation results over real Internet topologies, we
demonstrate that our scheme is scalable to very large networks, with up to
millions of nodes. The second model we consider is the malicious peers model,
where peers can behave arbitrarily, deliberately trying to affect the results
of the computation as well as compromising the privacy of other peers. For this
model we provide a fourth scheme to defend the execution of the computation
against the malicious peers. The proposed scheme has a higher complexity
relative to the semi-honest model. Overall, we provide the Peer-to-Peer network
designer a set of tools to choose from, based on the desired level of security.Comment: Submitted to Peer-to-Peer Networking and Applications Journal (PPNA)
200
A Performance and Resource Consumption Assessment of Secure Multiparty Computation
In recent years, secure multiparty computation (SMC) advanced from a
theoretical technique to a practically applicable technology. Several
frameworks were proposed of which some are still actively developed.
We perform a first comprehensive study of performance characteristics of SMC
protocols using a promising implementation based on secret sharing, a common
and state-of-the-art foundation. Therefor, we analyze its scalability with
respect to environmental parameters as the number of peers, network properties
-- namely transmission rate, packet loss, network latency -- and
parallelization of computations as parameters and execution time, CPU cycles,
memory consumption and amount of transmitted data as variables.
Our insights on the resource consumption show that such a solution is
practically applicable in intranet environments and -- with limitations -- in
Internet settings
Single-Shot Two Dimensional Time Resolved Coherent Anti Stokes Raman Scattering
Single-shot time resolved Coherent Anti-Stokes Raman Scattering (CARS) is
presented as a viable method for fast measurements of molecular spectra. The
method is based on the short spatial extension of femtosecond pulses and maps
time delays between pulses onto the region of intersection between broad beams.
The image of the emitted CARS signal contains full temporal information on the
field-free molecular dynamics, from which spectral information is extracted.
The method is demonstrated on liquid samples of CHBr3 and CHCl3 and the Raman
spectrum of the low-lying vibrational states of these molecules is measured
Sub-logarithmic Distributed Oblivious RAM with Small Block Size
Oblivious RAM (ORAM) is a cryptographic primitive that allows a client to
securely execute RAM programs over data that is stored in an untrusted server.
Distributed Oblivious RAM is a variant of ORAM, where the data is stored in
servers. Extensive research over the last few decades have succeeded to
reduce the bandwidth overhead of ORAM schemes, both in the single-server and
the multi-server setting, from to . However, all known
protocols that achieve a sub-logarithmic overhead either require heavy
server-side computation (e.g. homomorphic encryption), or a large block size of
at least .
In this paper, we present a family of distributed ORAM constructions that
follow the hierarchical approach of Goldreich and Ostrovsky [GO96]. We enhance
known techniques, and develop new ones, to take better advantage of the
existence of multiple servers. By plugging efficient known hashing schemes in
our constructions, we get the following results:
1. For any , we show an -server ORAM scheme with overhead, and block size . This scheme is
private even against an -server collusion. 2. A 3-server ORAM
construction with overhead and a block size
almost logarithmic, i.e. .
We also investigate a model where the servers are allowed to perform a linear
amount of light local computations, and show that constant overhead is
achievable in this model, through a simple four-server ORAM protocol
Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation
Auditing a secure multiparty computation (MPC) protocol entails the validation of the protocol transcript by a third party that is otherwise untrusted. In this work, we introduce the concept of end-to-end verifiable MPC (VMPC), that requires the validation to provide a correctness guarantee even in the setting that all servers, trusted setup primitives and all the client systems utilized by the input-providing users of the MPC protocol are subverted by an adversary. To instantiate VMPC, we introduce a new concept in the setting of zero-knowlegde protocols that we term crowd verifiable zero-knowledge (CVZK). A CVZK protocol enables a prover to convince a set of verifiers about a certain statement, even though each one individually contributes a small amount of entropy for verification and some of them are adversarially controlled. Given CVZK, we present a VMPC protocol that is based on discrete-logarithm related assumptions. At the high level of adversity that VMPC is meant to withstand, it is infeasible to ensure perfect correctness, thus we investigate the classes of functions and verifiability relations that are feasible in our framework, and present a number of possible applications the underlying functions of which can be implemented via VMPC
On Multiparty Garbling of Arithmetic Circuits
We initiate a study of garbled circuits that contain both Boolean and arithmetic gates in secure multiparty computation. In particular, we incorporate the garbling gadgets for arithmetic circuits recently presented by Ball, Malkin, and Rosulek (ACM CCS 2016) into the multiparty garbling paradigm initially introduced by Beaver, Micali, and Rogaway (STOC \u2790). This is the first work that studies arithmetic garbled circuits in the multiparty setting. Using mixed Boolean-arithmetic circuits allows more efficient secure computation of functions that naturally combine Boolean and arithmetic computations. Our garbled circuits are secure in the semi-honest model, under the same hardness assumptions as Ball et al., and can be efficiently and securely computed in constant rounds assuming an honest majority.
We first extend free addition and multiplication by a constant to the multiparty setting.
We then extend to the multiparty setting efficient garbled multiplication gates. The garbled multiplication gate construction we show was previously achieved only in the two-party setting and assuming a random oracle.
We further present a new garbling technique, and show how this technique can improve efficiency in garbling selector gates. Selector gates compute a simple ``if statement in the arithmetic setting: the gate selects the output value from two input integer values, according to a Boolean selector bit; if the bit is the output equals the first value, and if the bit is the output equals the second value. Using our new technique, we show a new and designated garbled selector gate that reduces by approximately the evaluation time, for any number of parties, from the best previously known constructions that use existing techniques and are secure based on the same hardness assumptions.
On the downside, we find that testing equality and computing exponentiation by a constant are significantly more complex to garble in the multiparty setting than in the two-party setting
- …