Skip to main content

A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy

  • Conference paper
  • First Online:
Machine Learning for Cyber Security (ML4CS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12486))

Included in the following conference series:

  • 1159 Accesses

Abstract

In cryptography, secure multi-party computation involves multi-party participant entities, each of them has its own secret input and wants to jointly compute a function through some interaction protocol. In this process, cheating by any of the parties will cause errors in the final result. In order to prevent parties from cheating, many experts have proposed protocols with semi-honest security, malicious security and covert security. However, existing protocols can only detect and deal with malicious attackers after being attacked. This passive approach will not only consume more resources, but also cause excessive losses for participants. To solve the above problems, this paper proposes an optimal participant selection model based on the time-varying entropy. Over time, we evaluate the safety entropy of the secure multi-party computation model. Once the entropy value exceeds the expectation, we will reselect the adversary through the reputation mechanism, thus always ensuring the safe state of the model. Our model can better predict the unsafe state of the system, and the security of the model can be guaranteed by the choice of the adversary. At this same time, it has better efficiency in the design of password protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(379–423), 623–656 (1948)

    Article  MathSciNet  Google Scholar 

  2. Yao, A.C.: Protocols for secure computation. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 160–164. IEEE (1982)

    Google Scholar 

  3. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218–229. ACM (1987)

    Google Scholar 

  4. Asharov, G., Lindell, Y., Zarosim, H.: Fair and Efficient Secure Multiparty Computation with Reputation Systems. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 201–220. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-42045-0_11

    Chapter  Google Scholar 

  5. Wang, Y., Zhao, C., Xu, Q., et al.: Fair secure computation with reputation assumptions in the mobile social networks. Mobile Inf. Syst. 1–8 (2015)

    Google Scholar 

  6. Aumann, Y., Lindell, Y.: Security against covert adversaries: efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137–156. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_8

    Chapter  Google Scholar 

  7. Asharov, G., Orlandi, C.: Calling out cheaters: covert security with public verifiability. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 681–698. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34961-4_41

    Chapter  Google Scholar 

  8. Nojoumian, M., Stinson, D.R.: Socio-rational secret sharing as a new direction in rational cryptography. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 18–37. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34266-0_2

    Chapter  Google Scholar 

  9. Garay, J., Katz, J., et al.: Rational protocol design: cryptography against incentive-driven adversaries. In: IEEE Symposium on Foundations of Computer Science. IEEE (2013)

    Google Scholar 

  10. Wang, Y., Liu, Z., et al.: Social rational secure multi-party computationx. Concurr. Comput. Pract. Exp. 26(5), 1067–1083 (2014)

    Article  Google Scholar 

  11. Caroline, P., Nathan, G.: Improving trust and reputation assessment with dynamic behaviour. Knowl. Eng. Rev. 35, e29 (2020)

    Article  Google Scholar 

  12. Yang, Y., Peng, H., et al.: General theory of security and a StudyCase in internet of things. IEEE Internet of Things J. 4(2), 592–600 (2017)

    Article  Google Scholar 

  13. Yang, Y., Niu, X., et al.: Games based study of nonblind confrontation. Math. Prob. Eng. (2017)

    Google Scholar 

  14. Stefan, R., Sandra, K.: Password security as a game of entropies. Entropy 20(5), 312 (2018)

    Google Scholar 

  15. Yimin, H., Xingli, C., et al.: The complexity and entropy analysis for service game model based on different expectations and optimal pricing. Entropy 20(11), 858 (2018)

    Article  Google Scholar 

  16. Yang, Y., Niu, X.: The General Theory of Information Security. Publishing House of Electronics Industry, Beijing (2018)

    Google Scholar 

  17. Yang, Y., Niu, X., et al.: A secure and efficient transmission method in connected vehicular cloud computing. IEEE Network

    Google Scholar 

  18. Yang, Y., Niu, X., Li, L., Peng, H., Ren, J., Qi, H.: General theory of security and a study of hacker’s behavior in big data era. Peer-to-Peer Netw. Appl. 11(2), 210–219 (2016). https://doi.org/10.1007/s12083-016-0517-5

    Article  Google Scholar 

  19. Wang, Y., Metere, R., Zhou, H., et al.: Incentive-driven attacker for corrupting two-party protocols. Soft Comput. Fus. Found. Methodol. Appl. 22(23), 7733–7740 (2018)

    MATH  Google Scholar 

  20. Bellini, E., Iraqi, Y., Damiani, E., et al.: Blockchain-based distributed trust and reputation management systems: a survey. IEEE Access 8, 21127–21151 (2020)

    Article  Google Scholar 

  21. Wang, Y., et al.: Secure computation protocols under asymmetric scenarios in enterprise information system. Enterpr. Inf. Syst. 1–21 (2019)

    Google Scholar 

  22. Kang, J., Xiong, Z., Niyato, D., et al.: Incentive mechanism for reliable federated learning: a joint optimization approach to combining reputation and contract theory. IEEE Internet of Things J. 6(6), 10700–10714 (2019)

    Article  Google Scholar 

  23. Hong, C., Katz, J., Kolesnikov, V., Lu, W., Wang, X.: Covert security with public verifiability: faster, leaner, and simpler. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11478, pp. 97–121. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17659-4_4

    Chapter  Google Scholar 

Download references

Acknowledgments

Our research work is funded by National Natural Science Foun-dation of China (No. 61962009), Major Scientific and Technological Special Project of Guizhou Province (20183001), Talent project of Guizhou Big Data Academy. Guizhou Provincial Key Laboratory of Public Big Data ([2018]01), Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ009).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuling Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, X., Liu, Y., Chen, Y., Wang, Z. (2020). A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-62223-7_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-62222-0

  • Online ISBN: 978-3-030-62223-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics