Auditing of Secure Multiparty Computations
نویسنده
چکیده
Secure multiparty computations allow independent parties to collectively analyze data without compromising their input’s privacy. This data secrecy is guaranteed in some security model: in the passive model an adversary can only look at data visible to it, while in the active model adversaries can actively interfere in the computations. So from a security standpoint the active model is preferable, but carries a significant overhead. This thesis proposes an intermediate model, which builds upon a system that is secure in the passive model, but audits the computations for active attacks. It carries the same guarantees provided by the passive model, while attempting to detect active attacks without being explicitly secure against them. To facilitate auditing, systems produce audit logs, which can be examined to detect active malicious behaviour. Audit logging was added to Sharemind, an existing secure multiparty computation platform that operates in the passive model, and a prototype audit tool was created to make inspecting the logs during the auditing process accessible to human auditors with only basic knowledge of secure multiparty computations. To test the viability of this model, an Internet voting demo application was created using this modified Sharemind and possible attacks against this application were analyzed from an auditability standpoint. The analysis unveiled that since the Sharemind audit logging implementation evaluates protocols without context, it is possible to automatically verify individual protocols and detect computational forgery, but the adversary can perform semantic forgery. The audit logs do not contain the semantics of the computation and this can be abused to modify inputs to protocols, effectively modifying the results. The need to include semantic information about the computation in the audit became apparent and is set as a goal for future work.
منابع مشابه
Secure Multiparty Quantum Computation for Summation and Multiplication
As a fundamental primitive, Secure Multiparty Summation and Multiplication can be used to build complex secure protocols for other multiparty computations, specially, numerical computations. However, there is still lack of systematical and efficient quantum methods to compute Secure Multiparty Summation and Multiplication. In this paper, we present a novel and efficient quantum approach to secu...
متن کاملTowards a Local Electricity Trading Market based on Secure Multiparty Computation
This paper presents a local electricity trading market that allows users to trade excess electricity among themselves in a decentralised and privacy-preserving manner. Users who have more electricity generated by their renewable energy sources than they need for themselves, can sell this electricity to other users using a bidding mechanism based on secure multiparty computations. Based on the b...
متن کاملSecure Multiparty Computations Without Computers
Many simple calculations can be done easier without computers than by using them. We show that the same holds for secure multiparty computations if the function to be computed is simple enough. Our starting point is an observation of Bert den Boer: a multiparty computation of a logical ANDgate can be performed by ve simple playing cards. We show that by using a reasonable amount of cards many u...
متن کاملEfficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards
It is known that secure multiparty computation can be performed using physical cards with identical backs, and numerous cardbased cryptographic protocols have been proposed. Almost all existing protocols require multiple cards that have the same pattern on their face sides; thus, a standard deck of playing cards cannot be used for executing these protocols. However, there is one exception: Niem...
متن کاملKnowledge inference for optimizing and enforcing secure computations
We present several techniques that aim to compute the belief or knowledge a party might have about the values of hidden variables involved in the computation. These techniques can be used for enforcing knowledge-based security policies and for optimizing secure multiparty computations.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014