Mostrar el registro sencillo del ítem

hal.structure.identifierInstitut de Mathématiques de Bordeaux [IMB]
hal.structure.identifierMathematisch Instituut Universiteit Leiden
hal.structure.identifierCentrum Wiskunde & Informatica [CWI]
dc.contributor.authorSPINI, Gabriele
hal.structure.identifierCentrum Wiskunde & Informatica [CWI]
dc.contributor.authorFEHR, Serge
dc.date.accessioned2024-04-04T03:12:20Z
dc.date.available2024-04-04T03:12:20Z
dc.date.conference2016-08-09
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/193860
dc.description.abstractEnIn this work we revisit the SPDZ multiparty computation protocol by Damgård et al. for securely computing a function in the presence of an unbounded number of dishonest parties. The SPDZ protocol is distinguished by its fast performance. A downside of the SPDZ protocol is that one single dishonest party can enforce the computation to fail, meaning that the honest parties have to abort the computation without learning the outcome, whereas the cheating party may actually learn it. Furthermore, the dishonest party can launch such an attack without being identified to be the cheater. This is a serious obstacle for practical deployment: there are various reasons for why a party may want the computation to fail, and without cheater detection there is little incentive for such a party not to cheat. As such, in many cases, the protocol will actually fail to do its job.In this work, we enhance the SPDZ protocol to allow for cheater detection: a dishonest party that enforces the protocol to fail will be identified as being the cheater. As a consequence, in typical real-life scenarios, parties will actually have little incentive to cheat, and if cheating still takes place, the cheater can be identified and discarded and the computation can possibly be re-done, until it succeeds.The challenge lies in adding this cheater detection feature to the original protocol without increasing its complexity significantly. In case no cheating takes place, our new protocol is as efficient as the original SPDZ protocol which has no cheater detection. In case cheating does take place, there may be some additional overhead, which is still reasonable in size though, and since the cheater knows he will be caught, this is actually unlikely to occur in typical real-life scenarios.
dc.language.isoen
dc.publisherSpringer
dc.source.title9th International Conference on Information Theoretic Security
dc.title.enCheater Detection in SPDZ Multiparty Computation
dc.typeCommunication dans un congrès
dc.identifier.doi10.1007/978-3-319-49175-2
dc.subject.halInformatique [cs]/Cryptographie et sécurité [cs.CR]
bordeaux.page151--176
bordeaux.volume10015
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
bordeaux.conference.titleInformation Theoretic Security
bordeaux.countryUS
bordeaux.title.proceeding9th International Conference on Information Theoretic Security
bordeaux.conference.cityTacoma, WA
bordeaux.peerReviewedoui
hal.identifierhal-01413412
hal.version1
hal.invitednon
hal.proceedingsnon
hal.conference.end2016-08-12
hal.popularnon
hal.audienceInternationale
hal.origin.linkhttps://hal.archives-ouvertes.fr//hal-01413412v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.btitle=9th%20International%20Conference%20on%20Information%20Theoretic%20Security&rft.volume=10015&rft.spage=151--176&rft.epage=151--176&rft.au=SPINI,%20Gabriele&FEHR,%20Serge&rft.genre=unknown


Archivos en el ítem

ArchivosTamañoFormatoVer

No hay archivos asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem