具有对抗节点的海量矩阵的编码安全多方计算

Seyed Reza Hoseini Najarkolaei, M. Maddah-ali, M. Aref
{"title":"具有对抗节点的海量矩阵的编码安全多方计算","authors":"Seyed Reza Hoseini Najarkolaei, M. Maddah-ali, M. Aref","doi":"10.1109/IWCIT50667.2020.9163533","DOIUrl":null,"url":null,"abstract":"In this work1, we consider the problem of secure multi-party computation (MPC), consisting of F sources, each has access to a large private matrix, N processing nodes or workers, and one master. The master is interested in the result of a polynomial function of the input matrices. Each source sends a randomized functions of its matrix, called as its share, to each server. The workers process their shares in interaction with each other, and send some results to the master such that it can derive the final results. There are several constraints: (1) each worker has a constraint on its storage, such that it can store equivalent of $\\displaystyle \\frac{1}{m}$ fraction of size of each input matrices from each source, information about the private inputs or can do malicious actions to make the final result incorrect. The objective is to design an MPC scheme with the minimum number of the workers, called recovery threshold, such that the final result is correct, servers learn no information about the input matrices, and the master learns nothing beyond the final result. In this paper, we propose an MPC scheme that achieves the recovery threshold of 3t+2m-1 workers, which is order-wise less than the recovery threshold of the conventional methods. The main challenge is to manage the errors propagated through the network by the adversarial nodes when the workers interact with each other in each round.","PeriodicalId":360380,"journal":{"name":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes\",\"authors\":\"Seyed Reza Hoseini Najarkolaei, M. Maddah-ali, M. Aref\",\"doi\":\"10.1109/IWCIT50667.2020.9163533\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this work1, we consider the problem of secure multi-party computation (MPC), consisting of F sources, each has access to a large private matrix, N processing nodes or workers, and one master. The master is interested in the result of a polynomial function of the input matrices. Each source sends a randomized functions of its matrix, called as its share, to each server. The workers process their shares in interaction with each other, and send some results to the master such that it can derive the final results. There are several constraints: (1) each worker has a constraint on its storage, such that it can store equivalent of $\\\\displaystyle \\\\frac{1}{m}$ fraction of size of each input matrices from each source, information about the private inputs or can do malicious actions to make the final result incorrect. The objective is to design an MPC scheme with the minimum number of the workers, called recovery threshold, such that the final result is correct, servers learn no information about the input matrices, and the master learns nothing beyond the final result. In this paper, we propose an MPC scheme that achieves the recovery threshold of 3t+2m-1 workers, which is order-wise less than the recovery threshold of the conventional methods. The main challenge is to manage the errors propagated through the network by the adversarial nodes when the workers interact with each other in each round.\",\"PeriodicalId\":360380,\"journal\":{\"name\":\"2020 Iran Workshop on Communication and Information Theory (IWCIT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Iran Workshop on Communication and Information Theory (IWCIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCIT50667.2020.9163533\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Iran Workshop on Communication and Information Theory (IWCIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCIT50667.2020.9163533","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

摘要

在这项工作中,我们考虑了安全多方计算(MPC)的问题,MPC由F个源组成,每个源可以访问一个大的私有矩阵,N个处理节点或工作节点和一个主节点。大师感兴趣的是输入矩阵的多项式函数的结果。每个源将其矩阵的随机函数(称为其共享)发送到每个服务器。工人们在相互作用中处理他们的份额,并将一些结果发送给主人,这样它就可以得出最终的结果。有几个约束:(1)每个worker对其存储有一个约束,这样它可以存储相当于$\displaystyle \frac{1}{m}$的每个输入矩阵大小的每个源的一部分,关于私有输入的信息,或者可以执行恶意操作使最终结果不正确。目标是设计一个MPC方案,具有最小的工人数量,称为恢复阈值,这样最终结果是正确的,服务器不了解有关输入矩阵的信息,并且主服务器除了最终结果之外什么也不了解。在本文中,我们提出了一种MPC方案,该方案实现了3t+2m-1工人的恢复阈值,其顺序小于传统方法的恢复阈值。主要的挑战是管理在每一轮工作人员相互交互时,敌对节点通过网络传播的错误。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes
In this work1, we consider the problem of secure multi-party computation (MPC), consisting of F sources, each has access to a large private matrix, N processing nodes or workers, and one master. The master is interested in the result of a polynomial function of the input matrices. Each source sends a randomized functions of its matrix, called as its share, to each server. The workers process their shares in interaction with each other, and send some results to the master such that it can derive the final results. There are several constraints: (1) each worker has a constraint on its storage, such that it can store equivalent of $\displaystyle \frac{1}{m}$ fraction of size of each input matrices from each source, information about the private inputs or can do malicious actions to make the final result incorrect. The objective is to design an MPC scheme with the minimum number of the workers, called recovery threshold, such that the final result is correct, servers learn no information about the input matrices, and the master learns nothing beyond the final result. In this paper, we propose an MPC scheme that achieves the recovery threshold of 3t+2m-1 workers, which is order-wise less than the recovery threshold of the conventional methods. The main challenge is to manage the errors propagated through the network by the adversarial nodes when the workers interact with each other in each round.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信