Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries

07/29/2020
by   Zhili Chen, et al.
0

Due to the great development of secure multi-party computation, many practical secure computation schemes have been proposed. As an example, different secure auction mechanisms have been widely studied, which can protect bid privacy while satisfying various economic properties. However, as far as we know, none of them solve the secure computation problems for multiple data providers (e.g., secure cloud resource auctions) in the malicious security model. In this paper, we use the techniques of cut-and-choose and garbled circuits to propose a general secure computation framework for multiple data providers against malicious adversaries. Specifically, our framework checks input consistency with the cut-and-choose paradigm, conducts maliciously secure computations by running two independent garbled circuits, and verifies the correctness of output by comparing two versions of outputs. Theoretical analysis shows that our framework is secure against a malicious computation party, or a subset of malicious data providers. Taking secure cloud resource auctions as an example, we implement our framework. Extensive experimental evaluations show that the performance of the proposed framework is acceptable in practice.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/10/2019

Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-Choose

As far as we know, the literature on secure computation from cut-and-cho...
research
05/03/2021

Three-Party Integer Comparison and Applications

Secure integer comparison has been a popular research topic in cryptogra...
research
09/15/2021

MPC-Friendly Commitments for Publicly Verifiable Covert Security

We address the problem of efficiently verifying a commitment in a two-pa...
research
08/07/2022

Garbled EDA: Privacy Preserving Electronic Design Automation

The complexity of modern integrated circuits (ICs) necessitates collabor...
research
09/03/2020

Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud

The cloud model allows many enterprises able to outsource computing reso...
research
01/26/2021

Biometric Verification Secure Against Malicious Adversaries

Biometric verification has been widely deployed in current authenticatio...
research
06/27/2021

An efficient and secure scheme of verifiable computation for Intel SGX

Cloud computing offers resource-constrained users big-volume data storag...

Please sign up or login with your details

Forgot password? Click here to reset