Fair and Efficient Secure Multiparty Computation with Reputation Systems

نویسندگان

  • Gilad Asharov
  • Yehuda Lindell
  • Hila Zarosim
چکیده

A reputation system for a set of entities is essentially a list of scores that provides a measure of the reliability of each entity in the set. The score given to an entity can be interpreted (and in the reputation system literature it often is [12]) as the probability that an entity will behave honestly. In this paper, we ask whether or not it is possible to utilize reputation systems for carrying out secure multiparty computation. We provide formal definitions of secure computation in this setting, and carry out a theoretical study of feasibility. We present almost tight results showing when it is and is not possible to achieve fair secure computation in our model. We suggest applications for our model in settings where some information about the honesty of other parties is given. This can be preferable to the current situation where either an honest majority is arbitrarily assumed, or a protocol that is secure for a dishonest majority is used and the efficiency and security guarantees (including fairness) of an honest majority are not obtained.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

An Anonymous Reputation System with Reputation Secrecy for Manager

Secure Multiparty Computation Privacy Assurances in Multiple Data-Aggregation Transactions. . . . . . . . . . . 3 Kim Le, Parmesh Ramanathan, and Kewal K. Saluja A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Tomas Toft Towards Secure Two-Party Computation from the Wire-Tap Channel . . . . ...

متن کامل

Secure Multiparty Computation vs. Fair Exchange - Bridging the Gap

In this paper, we propose a comparison of two seemingly similar problems, i.e., secure multiparty computation and fair exchange. However, if these two problems appear to bear a lot in common, they come from fields that differ greatly in the way the problems are described and approached, i.e., the fields of modern cryptography and distributed systems respectively. In that regard, straightforward...

متن کامل

پروتکل کارا برای جمع چندسویه امن با قابلیت تکرار

In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...

متن کامل

How to Use Bitcoin to Design Fair Protocols

We study a model of fairness in secure computation in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty. We then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-party as well as the multiparty setting (with a dishonest majority). In particular, we propose new ideal functionalities and pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013