密码算法与协议7_安全多方计算协议
合集下载
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Each organization would like its own requirements being satisfied usually, these requirements are modeled as linear equations or linear inequalities.
2016/1/8 5
What‟s role SMC plays in Cryptography
高级协议(广义安全多方计算):电子选举、拍卖、门限签名
基础协议:数字签名、零知识证明、VSS、盲签名 基本密码学算法:对称密码体制、非对称密码体制、HASH
数学基础:数论、抽象代数、常用数学难题
密码学相关知识层次图示
Therefore, they need a way to solve the problem while maintaining the privacy of their locations.
2016/1/8 4
Example 3
Two financial organizations plan to cooperatively work on a project for their mutual benefit.
disclosure of this information cost both companies a lot of money, it can also cause significant damage to the company if it is disclosed to other parties,
9
2016/1/8
Formal description of SMC
Imagine a constellation of parties P1, . . . , Pl each holding a value x1, . . . , xl, respectively, for which they like to evaluate the function value f(x1, . . . , xl) for some given function f. The problem of secure multiparty computation is to find a protocol for P1, . . . , Pl
e.g. another bigger competitor could then immediately occupy the market there before A or B even starts;
or some real estate company could actually raise their price during the negotiation if they know A or B is very interested in that location.
in a distributed network where each participant holds one of the inputs, ensuring independence of the inputs, correctness of the computation, and that no more information is revealed to a participant in the computation than can be inferred from that participant's input and output.
where people are cooperating with each other to conduct computation tasks based on the inputs they each supplies.
These computations could occur
between trusted partners, between partially trusted partners, or even between competitors. one must know inputs from all the participants; however if nobody can be trusted enough to know all the inputs, privacy will become a primary concern.
2016/1/8
6
More on SMC
广义上讲,所有的密码协议都可以看成是SMC的一个特例, 不同之处在于协议计算所用的函数不同 1976,Diffie Hellman->”New Directions in Cryptography”
Nowadays, from “sending/receiving security model” to “Internet security model” or “Distributed security model” New challenge: 如何在多个互不信任的参与者之间执行复杂 的分布式计算任务,并保证传统意义上的安全性
Therefore protocols that can support joint computations while protecting the participants' privacy are of growing importance. In theory, the general secure multiparty computation problem is solvable but, as Goldreich points out,
The problem is how to conduct such a computation while preserving the privacy of the inputs. Generally speaking, a secure multiparty computation problem deals with computing any probabilistic function on any input,
2016/1/8
7
Secure multiparty computation problem
The common property of the above examples:
two or more parties want to conduct a computation based on their private inputs, but neither party is willing to disclose its own input to anybody else.
which enables them to jointly compute output value f(x1, . . . , xl), however in such a way that their respective input values x1, . . . , xl remain secret, except for the information that can be inferred logically from the output value.
However, their requirements are proprietary data that includes the customer's projects of the likely future evolution of certain commodity prices, interest and inflation rates, economic statistics, portfolio holdings. Therefore, nobody likes to disclose its requirements to the other party, or even to a “trusted” third party. How could they cooperate on this project while preserving the privacy of the individual information?
Chapter 7. Secure Multiparty Computation
2016/1/8
1
Introduction
The proliferation of the Internet has triggered tremendous opportunities for cooperative computation,
8
2016/1/8
No trusted third party
Currently, to solve the above problems, a commonly strategy is
to assume the trustworthiness of the service providers, or to assume the existence of a trusted third party, which is risky in nowadays' dynamic and malicious environment.
Usually, to conduct these computations,
2016/1/8
2
Example 1
Alice thinks that she may have some genetic disease, and she wants to investigate it herself. She also knows that Bob has a database containing DNA patterns about various diseases. After Alice gets a sample of her DNA sequence, she sends it to Bob, who will then tell Alice the diagnosis. However, if Alice is concerned about her privacy, the above process is not acceptable
because it does not prevent Bob from knowing Alice's private information - both the DNA and the query resue 2
Company A decided that expanding its market; another competing company B is also planning to expand its market share in some region. Strategically, A and B do not want to compete against each other in the same region So they want to know whether their regions overlap without giving away location information
using the solutions derived by these general results for special cases of multiparty computation can be impractical; special solutions should be developed for special cases for efficiency reasons.