SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS

Sebastian Obermeier, Stefan Böttcher

2007

Abstract

A secure calculation of common data (D1 ∩ . . . ∩ Dn ) of different participants without disclosing Di is useful for many applications and has been studied as the Secure Multiparty Computation problem. However, proposed solutions assume all participants act “semi-honest”, which means participants may neither alter the protocol execution nor fake database content. In this contribution, we focus on malicious participant behavior and prove that an atomic exchange of common data is not possible under the assumption of malicious participants. We propose a mechanism to calculate the intersection of multiple participants, which does not only reduce the disclosure in case participants cheat by altering the protocol to a negligible amount, it is also resistant against malicious participants that cooperate in order to cheat others. Furthermore, it impedes database content faking, which could be done when using other protocols by participants in order to check if data is contained in the other’s databases. Last, we show experimentally the practical usability of our protocol and how the level of trust has an impact on the exchange speed of the intersection.

Download


Paper Citation


in Harvard Style

Obermeier S. and Böttcher S. (2007). SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 345-354. DOI: 10.5220/0002117903450354

in Bibtex Style

@conference{secrypt07,
author={Sebastian Obermeier and Stefan Böttcher},
title={SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={345-354},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002117903450354},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - SECURE COMPUTATION OF COMMON DATA AMONG MALICIOUS PARTNERS
SN - 978-989-8111-12-8
AU - Obermeier S.
AU - Böttcher S.
PY - 2007
SP - 345
EP - 354
DO - 10.5220/0002117903450354