Secure Multi-Party Sorting and Applications

作者: Gunnar Kreitz , Misbah Uddin , Kristjan Valur Jónsson

DOI:

关键词:

摘要: Research within the area of cryptography constitutes core this the- sis. In addition to cryptography, we also present results in peer-assisted streaming and web security. We on two specific cryptographic problems: broadcast encryption secure multi-party computation. Broad- cast is problem efficiently securely distributing content a large changing group receivers. Secure computation subject how number parties can collaborate securely. All all, thesis spans from systems work discussing Spotify system with millions users, more theoretic, foundational results. Streaming among largest applications Internet today. On- demand services allow users consume media they want, at their convenience. With catalogs offered by many services, access wide selection content. Live provides means for corporations as well individuals world. The power such broadcasts was shown recent (early 2011) revolts Tunisia Egypt, where protesters streamed live demonstrations. To stream global audience requires significant resources, particular terms bandwidth needed. One approach reduce requirements use peer-to-peer techniques, clients assist media. commercial music-on-demand system, using streaming. thesis, discuss protocol measurements its performance. systems, it important restrict solutions encryption. Within area, first which improves efficiency previous cost lowered secu- rity guarantees. second contains lower-bound proofs, showing that early protocols subset cover framework are essentially optimal. Many web-based, user accesses browser. Apart usage web, subscriptions bought This provide service, must understand result new type attack, an old history detection vulnerability time execution redirect victim’s computation, has three contributions. Firstly, give efficient basic functions summation disjunction adapt network run on. Secondly, sorting aggregation, techniques networks. Finally, prove dichotomy theorem, all distinct outputs either maximally easy or difficult regards security provided.

参考文章(33)
Xenofontas Dimitropoulos, Martin Burkhart, Mario Strasser, Dilip Many, SEPIA: privacy-preserving aggregation of multi-domain network events and statistics usenix security symposium. pp. 15- 15 ,(2010)
David Chaum, Claude Crépeau, Ivan Damgård, Multiparty Unconditionally Secure Protocols (Extended Abstract) symposium on the theory of computing. pp. 11- 19 ,(1988)
Silvio Micali, Phillip Rogaway, Donald Beaver, The Round Complexity of Secure Protocols (Extended Abstract) symposium on the theory of computing. pp. 503- 513 ,(1990)
Avi Wigderson, Shafi Goldwasser, Michael Ben-Or, Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) symposium on the theory of computing. pp. 1- 10 ,(1988)
Dan Bogdanov, Sven Laur, Jan Willemson, Sharemind: A Framework for Fast Privacy-Preserving Computations european symposium on research in computer security. pp. 192- 206 ,(2008) , 10.1007/978-3-540-88313-5_13
Patrick Lincoln, Phillip Porras, Vitally Shmatikov, Privacy-preserving sharing and correction of security alerts usenix security symposium. pp. 17- 17 ,(2004)
Ivan Damgård, Sigurd Meldgaard, Jesper Buus Nielsen, Perfectly secure oblivious RAM without random oracles theory of cryptography conference. ,vol. 6597, pp. 144- 163 ,(2011) , 10.1007/978-3-642-19571-6_10
Takashi Nishide, Kazuo Ohta, Multiparty computation for interval, equality, and comparison without bit-decomposition protocol public key cryptography. ,vol. 343, pp. 343- 360 ,(2007) , 10.1007/978-3-540-71677-8_23
Martin Burkhart, Xenofontas Dimitropoulos, Fast Privacy-Preserving Top-k Queries Using Secret Sharing international conference on computer communications and networks. pp. 1- 7 ,(2010) , 10.1109/ICCCN.2010.5560086
Assaf Ben-David, Noam Nisan, Benny Pinkas, FairplayMP Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. pp. 257- 266 ,(2008) , 10.1145/1455770.1455804