Towards efficient private distributed computation on unbounded input streams

In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay,...

Full description

Bibliographic Details
Main Authors: Dolev Shlomi, Garay Juan, Gilboa Niv, Kolesnikov Vladimir, Yuditsky Yelena
Format: Article
Language:English
Published: De Gruyter 2015-06-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2013-0039
id doaj-7007c1c332d246928f292ddabcba0877
record_format Article
spelling doaj-7007c1c332d246928f292ddabcba08772021-09-06T19:40:44ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842015-06-0192799410.1515/jmc-2013-0039Towards efficient private distributed computation on unbounded input streamsDolev Shlomi0Garay Juan1Gilboa Niv2Kolesnikov Vladimir3Yuditsky Yelena4Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, IsraelAT&T Labs – Research, Florham Park, New Jersey, USADepartment of Communication Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, IsraelBell Laboratories, Murray Hill, New Jersey, USADepartment of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, IsraelIn the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay, Gilboa and Kolesnikov [Innov. Comput. Sci. (2011), 32–44] considered this problem in the setting of information-theoretic security, showing how to perform such computations on input streams of unbounded length. However, the cost of their solution is exponential in the size of the finite state automaton (FSA) computing the function. In this work we are interested in an efficient (i.e., polynomial time) computation of the above model, at the expense of minimal additional assumptions. Relying on the existence of one-way functions, we show how to process unbounded inputs (polynomial in the security parameter) at a cost linear in m, the number of FSA states. In particular, our algorithms achieve the following: In the case of (n,n)-reconstruction (i.e., in which all n agents participate in the reconstruction of the distributed computation) and at most n - 1 agents are corrupted, the time required to process each input symbol and the time complexity for reconstruction are O(mn)$O(mn)$, while agent storage is O(m+n)$O(m+n)$. In the case of (n-t,n)$(n-t,n)$-reconstruction (where only n-t$n-t$ agents take part in the reconstruction) and at most t agents are corrupted, the agents' storage is O(n-1n-t+m)$O(\binom{n-1}{n-t}+m)$, the time required to process each input symbol is O(mn-1n-t)$O(m\binom{n-1}{n-t})$ and the time complexity of reconstruction is O(mt)$O(mt)$. We achieve the above through a carefully orchestrated use of pseudo-random generators and secret-sharing, and in particular a novel share re-randomization technique which might be of independent interest.https://doi.org/10.1515/jmc-2013-0039secure multiparty computationprivacy in computing94a6094a6268m14
collection DOAJ
language English
format Article
sources DOAJ
author Dolev Shlomi
Garay Juan
Gilboa Niv
Kolesnikov Vladimir
Yuditsky Yelena
spellingShingle Dolev Shlomi
Garay Juan
Gilboa Niv
Kolesnikov Vladimir
Yuditsky Yelena
Towards efficient private distributed computation on unbounded input streams
Journal of Mathematical Cryptology
secure multiparty computation
privacy in computing
94a60
94a62
68m14
author_facet Dolev Shlomi
Garay Juan
Gilboa Niv
Kolesnikov Vladimir
Yuditsky Yelena
author_sort Dolev Shlomi
title Towards efficient private distributed computation on unbounded input streams
title_short Towards efficient private distributed computation on unbounded input streams
title_full Towards efficient private distributed computation on unbounded input streams
title_fullStr Towards efficient private distributed computation on unbounded input streams
title_full_unstemmed Towards efficient private distributed computation on unbounded input streams
title_sort towards efficient private distributed computation on unbounded input streams
publisher De Gruyter
series Journal of Mathematical Cryptology
issn 1862-2976
1862-2984
publishDate 2015-06-01
description In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay, Gilboa and Kolesnikov [Innov. Comput. Sci. (2011), 32–44] considered this problem in the setting of information-theoretic security, showing how to perform such computations on input streams of unbounded length. However, the cost of their solution is exponential in the size of the finite state automaton (FSA) computing the function. In this work we are interested in an efficient (i.e., polynomial time) computation of the above model, at the expense of minimal additional assumptions. Relying on the existence of one-way functions, we show how to process unbounded inputs (polynomial in the security parameter) at a cost linear in m, the number of FSA states. In particular, our algorithms achieve the following: In the case of (n,n)-reconstruction (i.e., in which all n agents participate in the reconstruction of the distributed computation) and at most n - 1 agents are corrupted, the time required to process each input symbol and the time complexity for reconstruction are O(mn)$O(mn)$, while agent storage is O(m+n)$O(m+n)$. In the case of (n-t,n)$(n-t,n)$-reconstruction (where only n-t$n-t$ agents take part in the reconstruction) and at most t agents are corrupted, the agents' storage is O(n-1n-t+m)$O(\binom{n-1}{n-t}+m)$, the time required to process each input symbol is O(mn-1n-t)$O(m\binom{n-1}{n-t})$ and the time complexity of reconstruction is O(mt)$O(mt)$. We achieve the above through a carefully orchestrated use of pseudo-random generators and secret-sharing, and in particular a novel share re-randomization technique which might be of independent interest.
topic secure multiparty computation
privacy in computing
94a60
94a62
68m14
url https://doi.org/10.1515/jmc-2013-0039
work_keys_str_mv AT dolevshlomi towardsefficientprivatedistributedcomputationonunboundedinputstreams
AT garayjuan towardsefficientprivatedistributedcomputationonunboundedinputstreams
AT gilboaniv towardsefficientprivatedistributedcomputationonunboundedinputstreams
AT kolesnikovvladimir towardsefficientprivatedistributedcomputationonunboundedinputstreams
AT yuditskyyelena towardsefficientprivatedistributedcomputationonunboundedinputstreams
_version_ 1717767910058885120