TY - JOUR
T1 - Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation
AU - Dolev, Shlomi
AU - Gilboa, Niv
AU - Li, Ximing
N1 - Funding Information:
Supported by the Rita Altura Trust Chair in Computer Sciences, Israel Science Foundation (grant 428/11).Supported by the National Natural Science Foundation of China (No. 61472146 and 61402184) and Scientific Research Staring Foundation for the Returned Overseas Chinese Scholars (Ministry of Education of China).
Publisher Copyright:
© 2019 Elsevier B.V.
PY - 2019/11/26
Y1 - 2019/11/26
N2 - Information theoretically secure multi-party computation implies severe communication overhead among the computing participants, as there is a need to reduce the polynomial degree after each multiplication. In particular, when the input is (practically) unbounded, the number of multiplications and therefore the communication bandwidth among the participants may be practically unbounded. In some scenarios the communication among the participants should better be avoided altogether, avoiding linkage among the secret share holders. For example, when processes in clouds operate over streaming secret shares without communicating with each other, they can actually hide their linkage and activity in the crowd. An adversary that is able to compromise processes in the cloud may need to capture and analyze a very large number of possible shares. Consider a dealer that wants to repeatedly compute functions on a long file with the assistance of m servers. The dealer does not wish to leak either the input file or the result of the computation to any of the servers. We investigate this setting given two constraints. The dealer is allowed to share each symbol of the input file among the servers and is allowed to halt the computation at any point. However, the dealer is otherwise stateless. Furthermore, each server is not allowed any communication beyond the shares of the inputs that it receives and the information it provides to the dealer during reconstruction. We present a protocol in this setting for generalized string matching, including wildcards. We also present solutions for identifying other regular languages, as well as particular context free and context sensitive languages. The results can be described by a newly defined accumulating automata (AA) and cascaded equations automata (CEA) which may be of an independent interest. As an application of accumulating automata and cascaded equations automata, secure and private repeated computations on a secret shared file among communicationless clouds are presented.
AB - Information theoretically secure multi-party computation implies severe communication overhead among the computing participants, as there is a need to reduce the polynomial degree after each multiplication. In particular, when the input is (practically) unbounded, the number of multiplications and therefore the communication bandwidth among the participants may be practically unbounded. In some scenarios the communication among the participants should better be avoided altogether, avoiding linkage among the secret share holders. For example, when processes in clouds operate over streaming secret shares without communicating with each other, they can actually hide their linkage and activity in the crowd. An adversary that is able to compromise processes in the cloud may need to capture and analyze a very large number of possible shares. Consider a dealer that wants to repeatedly compute functions on a long file with the assistance of m servers. The dealer does not wish to leak either the input file or the result of the computation to any of the servers. We investigate this setting given two constraints. The dealer is allowed to share each symbol of the input file among the servers and is allowed to halt the computation at any point. However, the dealer is otherwise stateless. Furthermore, each server is not allowed any communication beyond the shares of the inputs that it receives and the information it provides to the dealer during reconstruction. We present a protocol in this setting for generalized string matching, including wildcards. We also present solutions for identifying other regular languages, as well as particular context free and context sensitive languages. The results can be described by a newly defined accumulating automata (AA) and cascaded equations automata (CEA) which may be of an independent interest. As an application of accumulating automata and cascaded equations automata, secure and private repeated computations on a secret shared file among communicationless clouds are presented.
KW - Automata
KW - Communicationless clouds
KW - Multi-party computation
KW - Theoretically secure
UR - http://www.scopus.com/inward/record.url?scp=85069587638&partnerID=8YFLogxK
U2 - 10.1016/j.tcs.2019.06.005
DO - 10.1016/j.tcs.2019.06.005
M3 - Article
AN - SCOPUS:85069587638
SN - 0304-3975
VL - 795
SP - 81
EP - 99
JO - Theoretical Computer Science
JF - Theoretical Computer Science
ER -