Towards efficient private distributed computation on unbounded input streams
In the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay,...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2015-06-01
|
Series: | Journal of Mathematical Cryptology |
Subjects: | |
Online Access: | https://doi.org/10.1515/jmc-2013-0039 |
id |
doaj-7007c1c332d246928f292ddabcba0877 |
---|---|
record_format |
Article |
spelling |
doaj-7007c1c332d246928f292ddabcba08772021-09-06T19:40:44ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842015-06-0192799410.1515/jmc-2013-0039Towards efficient private distributed computation on unbounded input streamsDolev Shlomi0Garay Juan1Gilboa Niv2Kolesnikov Vladimir3Yuditsky Yelena4Department of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, IsraelAT&T Labs – Research, Florham Park, New Jersey, USADepartment of Communication Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva, IsraelBell Laboratories, Murray Hill, New Jersey, USADepartment of Computer Science, Ben-Gurion University of the Negev, Beer-Sheva, IsraelIn the problem of private “swarm” computing, n agents wish to securely and distributively perform a computation on common inputs, in such a way that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation. Recently, Dolev, Garay, Gilboa and Kolesnikov [Innov. Comput. Sci. (2011), 32–44] considered this problem in the setting of information-theoretic security, showing how to perform such computations on input streams of unbounded length. However, the cost of their solution is exponential in the size of the finite state automaton (FSA) computing the function. In this work we are interested in an efficient (i.e., polynomial time) computation of the above model, at the expense of minimal additional assumptions. Relying on the existence of one-way functions, we show how to process unbounded inputs (polynomial in the security parameter) at a cost linear in m, the number of FSA states. In particular, our algorithms achieve the following: In the case of (n,n)-reconstruction (i.e., in which all n agents participate in the reconstruction of the distributed computation) and at most n - 1 agents are corrupted, the time required to process each input symbol and the time complexity for reconstruction are O(mn)$O(mn)$, while agent storage is O(m+n)$O(m+n)$. In the case of (n-t,n)$(n-t,n)$-reconstruction (where only n-t$n-t$ agents take part in the reconstruction) and at most t agents are corrupted, the agents' storage is O(n-1n-t+m)$O(\binom{n-1}{n-t}+m)$, the time required to process each input symbol is O(mn-1n-t)$O(m\binom{n-1}{n-t})$ and the time complexity of reconstruction is O(mt)$O(mt)$. We achieve the above through a carefully orchestrated use of pseudo-random generators and secret-sharing, and in particular a novel share re-randomization technique which might be of independent interest.https://doi.org/10.1515/jmc-2013-0039secure multiparty computationprivacy in computing94a6094a6268m14 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Dolev Shlomi Garay Juan Gilboa Niv Kolesnikov Vladimir Yuditsky Yelena |
spellingShingle |
Dolev Shlomi Garay Juan Gilboa Niv Kolesnikov Vladimir Yuditsky Yelena Towards efficient private distributed computation on unbounded input streams Journal of Mathematical Cryptology secure multiparty computation privacy in computing 94a60 94a62 68m14 |
author_facet |
Dolev Shlomi Garay Juan Gilboa Niv Kolesnikov Vladimir Yuditsky Yelena |
author_sort |
Dolev Shlomi |
title |
Towards efficient private distributed computation on unbounded input streams |
title_short |
Towards efficient private distributed computation on unbounded input streams |
title_full |
Towards efficient private distributed computation on unbounded input streams |
title_fullStr |
Towards efficient private distributed computation on unbounded input streams |
title_full_unstemmed |
Towards efficient private distributed computation on unbounded input streams |
title_sort |
towards efficient private distributed computation on unbounded input streams |
publisher |
De Gruyter |
series |
Journal of Mathematical Cryptology |
issn |
1862-2976 1862-2984 |
publishDate |
2015-06-01 |
description |
In the problem of private “swarm” computing, n agents wish to securely and
distributively perform a computation on common inputs, in such a way
that even if the entire memory contents of some of them are exposed,
no information is revealed about the state of the computation.
Recently, Dolev, Garay, Gilboa and Kolesnikov
[Innov. Comput. Sci. (2011), 32–44]
considered this problem in the setting of information-theoretic security, showing how to perform such computations on input streams of unbounded length. However, the cost of their solution is exponential in the size of the finite state automaton (FSA) computing the function.
In this work we are interested in an efficient (i.e., polynomial time)
computation of the above model, at the expense of minimal
additional assumptions. Relying on the existence of one-way functions,
we show how to process unbounded inputs (polynomial in the security parameter)
at a cost linear in m, the number of FSA states. In
particular, our algorithms achieve the following:
In the case of (n,n)-reconstruction (i.e., in which all n
agents participate in the reconstruction of the distributed
computation) and at most n - 1 agents are corrupted, the time required to process each input symbol and the time complexity for reconstruction are O(mn)$O(mn)$, while agent storage is O(m+n)$O(m+n)$.
In the case of (n-t,n)$(n-t,n)$-reconstruction (where only n-t$n-t$ agents
take part in the reconstruction) and at most t agents are corrupted,
the agents' storage is O(n-1n-t+m)$O(\binom{n-1}{n-t}+m)$, the time required to process each input symbol is O(mn-1n-t)$O(m\binom{n-1}{n-t})$ and the time complexity of reconstruction is O(mt)$O(mt)$.
We achieve the above through a carefully orchestrated use of pseudo-random generators and secret-sharing, and in particular a novel share
re-randomization technique which might be of independent interest. |
topic |
secure multiparty computation privacy in computing 94a60 94a62 68m14 |
url |
https://doi.org/10.1515/jmc-2013-0039 |
work_keys_str_mv |
AT dolevshlomi towardsefficientprivatedistributedcomputationonunboundedinputstreams AT garayjuan towardsefficientprivatedistributedcomputationonunboundedinputstreams AT gilboaniv towardsefficientprivatedistributedcomputationonunboundedinputstreams AT kolesnikovvladimir towardsefficientprivatedistributedcomputationonunboundedinputstreams AT yuditskyyelena towardsefficientprivatedistributedcomputationonunboundedinputstreams |
_version_ |
1717767910058885120 |