loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sebastian Obermeier and Stefan Böttcher

Affiliation: University of Paderborn, Germany

ISBN: 978-989-8111-12-8

Keyword(s): Multiparty Computation, Intersection, Malicious Behavior.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Protection ; Database Security and Privacy ; Information and Systems Security ; Information Assurance ; Information Hiding ; Security in Information Systems

Abstract: A secure calculation of common data (D1 ∩ . . . ∩ Dn ) of different participants without disclosing Di is useful for many applications and has been studied as the Secure Multiparty Computation problem. However, proposed solutions assume all participants act “semi-honest”, which means participants may neither alter the protocol execution nor fake database content. In this contribution, we focus on malicious participant behavior and prove that an atomic exchange of common data is not possible under the assumption of malicious participants. We propose a mechanism to calculate the intersection of multiple participants, which does not only reduce the disclosure in case participants cheat by altering the protocol to a negligible amount, it is also resistant against malicious participants that cooperate in order to cheat others. Furthermore, it impedes database content faking, which could be done when using other protocols by participants in order to check if data is contained in the other’s databases. Last, we show experimentally the practical usability of our protocol and how the level of trust has an impact on the exchange speed of the intersection. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.171.108

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Obermeier S.; Böttcher S. and (2007). SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS.In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 345-354. DOI: 10.5220/0002117903450354

@conference{secrypt07,
author={Sebastian Obermeier and Stefan Böttcher},
title={SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={345-354},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002117903450354},
isbn={978-989-8111-12-8},
}

TY - CONF

JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS
SN - 978-989-8111-12-8
AU - Obermeier, S.
AU - Böttcher, S.
PY - 2007
SP - 345
EP - 354
DO - 10.5220/0002117903450354

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.