A fully card-safe protocol for securely aggregating distributed information

نویسنده

  • David Fernández-Duque
چکیده

We study a general scenario where confidential information is distributed among a group of agents who wish to share it in such a way that the data becomes common knowledge among them but an eavesdropper intercepting their communications would be unable to obtain any of said data. The information is modelled as a deck of cards dealt among the agents, so that after the information is exchanged, all of the communicating agents must know the entire deal, but the eavesdropper must remain ignorant about who holds each card. Valentin Goranko and the author previously set up this scenario as the secure aggregation of distributed information problem and constructed weakly safe protocols, where given any card c, the eavesdropper does not know with certainty which agent holds c. Here we present a perfectly safe protocol, which does not alter the eavesdropper’s perceived probability that any given agent holds c. In our protocol, one of the communicating agents holds a larger portion of the cards than the rest, but we show how for infinitely many values of a, the number of cards may be chosen so that each of the m agents holds more than a cards and less than 2ma.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Card-based protocols using unequal division shuffles

Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and ...

متن کامل

Five-Card Secure Computations Using Unequal Division Shuffle

Card-based cryptographic protocols can perform secure computation of Boolean functions. Cheung et al. recently presented an elegant protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called unequal division shuffle; after a sequence of five cards is divided into a two-card portio...

متن کامل

Card-Based Protocols for Any Boolean Function

Card-based protocols that are based on a deck of physical cards achieve secure multi-party computation with information-theoretic secrecy. Using existing AND, XOR, NOT, and copy protocols, one can naively construct a secure computation protocol for any given (multivariable) Boolean function as long as there are plenty of additional cards. However, an explicit sufficient number of cards for comp...

متن کامل

An Efficient and Secure Credit Card-based Billing Scheme for Telephone Services

MasterCard and VisaCard use credit cards to support a number of services, such as Masterphone or Visaphone, which allow cardholders to make phone calls from any telephone. However, these services take little or no security precautions. Although SET protocol has defined a secure payment method for card transactions over open networks, it cannot fit in telephone systems. In this paper, we propose...

متن کامل

Distributed Aggregation of Micropayments

We propose a novel protocol for aggregating micropayments in a networked environment. The protocol is based on the idea of debt consolidation and is fully distributed. We propose client-server and serverless versions of the protocol. We also analyze the mathematical properties of the protocol. Finally, we show how basic cryptographic techniques can be used to support the operation of the protoc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1505.02824  شماره 

صفحات  -

تاریخ انتشار 2015