Swarming secrets

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations

    Abstract

    Information-theoretically secure schemes for sharing and modifying a secret among a dynamic swarm of computing devices are presented. The schemes securely and distributively maintain a global state for the swarm, and support an unlimited number of changes to the state according to (global) inputs received. We present proactively secure schemes supporting players joining and leaving the swarm. The schemes also allow swarms to be merged, cloned and split. We use the above schemes as a basis to implement an oblivious universal Turing machine, capable of evaluating dynamically specified functions.

    Original languageEnglish
    Title of host publication2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
    PublisherInstitute of Electrical and Electronics Engineers
    Pages1438-1445
    Number of pages8
    ISBN (Print)9781424458714
    DOIs
    StatePublished - 1 Jan 2009
    Event2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009 - Monticello, IL, United States
    Duration: 30 Sep 20092 Oct 2009

    Publication series

    Name2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009

    Conference

    Conference2009 47th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2009
    Country/TerritoryUnited States
    CityMonticello, IL
    Period30/09/092/10/09

    ASJC Scopus subject areas

    • General Computer Science
    • Control and Systems Engineering
    • Communication

    Fingerprint

    Dive into the research topics of 'Swarming secrets'. Together they form a unique fingerprint.

    Cite this