Abstract
In cryptography, secure multi-party computation involves multi-party participant entities, each of them has its own secret input and wants to jointly compute a function through some interaction protocol. In this process, cheating by any of the parties will cause errors in the final result. In order to prevent parties from cheating, many experts have proposed protocols with semi-honest security, malicious security and covert security. However, existing protocols can only detect and deal with malicious attackers after being attacked. This passive approach will not only consume more resources, but also cause excessive losses for participants. To solve the above problems, this paper proposes an optimal participant selection model based on the time-varying entropy. Over time, we evaluate the safety entropy of the secure multi-party computation model. Once the entropy value exceeds the expectation, we will reselect the adversary through the reputation mechanism, thus always ensuring the safe state of the model. Our model can better predict the unsafe state of the system, and the security of the model can be guaranteed by the choice of the adversary. At this same time, it has better efficiency in the design of password protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(379–423), 623–656 (1948)
Yao, A.C.: Protocols for secure computation. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 160–164. IEEE (1982)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218–229. ACM (1987)
Asharov, G., Lindell, Y., Zarosim, H.: Fair and Efficient Secure Multiparty Computation with Reputation Systems. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013. LNCS, vol. 8270, pp. 201–220. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-42045-0_11
Wang, Y., Zhao, C., Xu, Q., et al.: Fair secure computation with reputation assumptions in the mobile social networks. Mobile Inf. Syst. 1–8 (2015)
Aumann, Y., Lindell, Y.: Security against covert adversaries: efficient protocols for realistic adversaries. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 137–156. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_8
Asharov, G., Orlandi, C.: Calling out cheaters: covert security with public verifiability. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 681–698. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34961-4_41
Nojoumian, M., Stinson, D.R.: Socio-rational secret sharing as a new direction in rational cryptography. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 18–37. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34266-0_2
Garay, J., Katz, J., et al.: Rational protocol design: cryptography against incentive-driven adversaries. In: IEEE Symposium on Foundations of Computer Science. IEEE (2013)
Wang, Y., Liu, Z., et al.: Social rational secure multi-party computationx. Concurr. Comput. Pract. Exp. 26(5), 1067–1083 (2014)
Caroline, P., Nathan, G.: Improving trust and reputation assessment with dynamic behaviour. Knowl. Eng. Rev. 35, e29 (2020)
Yang, Y., Peng, H., et al.: General theory of security and a StudyCase in internet of things. IEEE Internet of Things J. 4(2), 592–600 (2017)
Yang, Y., Niu, X., et al.: Games based study of nonblind confrontation. Math. Prob. Eng. (2017)
Stefan, R., Sandra, K.: Password security as a game of entropies. Entropy 20(5), 312 (2018)
Yimin, H., Xingli, C., et al.: The complexity and entropy analysis for service game model based on different expectations and optimal pricing. Entropy 20(11), 858 (2018)
Yang, Y., Niu, X.: The General Theory of Information Security. Publishing House of Electronics Industry, Beijing (2018)
Yang, Y., Niu, X., et al.: A secure and efficient transmission method in connected vehicular cloud computing. IEEE Network
Yang, Y., Niu, X., Li, L., Peng, H., Ren, J., Qi, H.: General theory of security and a study of hacker’s behavior in big data era. Peer-to-Peer Netw. Appl. 11(2), 210–219 (2016). https://doi.org/10.1007/s12083-016-0517-5
Wang, Y., Metere, R., Zhou, H., et al.: Incentive-driven attacker for corrupting two-party protocols. Soft Comput. Fus. Found. Methodol. Appl. 22(23), 7733–7740 (2018)
Bellini, E., Iraqi, Y., Damiani, E., et al.: Blockchain-based distributed trust and reputation management systems: a survey. IEEE Access 8, 21127–21151 (2020)
Wang, Y., et al.: Secure computation protocols under asymmetric scenarios in enterprise information system. Enterpr. Inf. Syst. 1–21 (2019)
Kang, J., Xiong, Z., Niyato, D., et al.: Incentive mechanism for reliable federated learning: a joint optimization approach to combining reputation and contract theory. IEEE Internet of Things J. 6(6), 10700–10714 (2019)
Hong, C., Katz, J., Kolesnikov, V., Lu, W., Wang, X.: Covert security with public verifiability: faster, leaner, and simpler. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11478, pp. 97–121. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17659-4_4
Acknowledgments
Our research work is funded by National Natural Science Foun-dation of China (No. 61962009), Major Scientific and Technological Special Project of Guizhou Province (20183001), Talent project of Guizhou Big Data Academy. Guizhou Provincial Key Laboratory of Public Big Data ([2018]01), Foundation of Guizhou Provincial Key Laboratory of Public Big Data (2018BDKFJJ009).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, X., Liu, Y., Chen, Y., Wang, Z. (2020). A Secure Multi-party Computational Adversary Selection Model Based on Time-Varying of Entropy. In: Chen, X., Yan, H., Yan, Q., Zhang, X. (eds) Machine Learning for Cyber Security. ML4CS 2020. Lecture Notes in Computer Science(), vol 12486. Springer, Cham. https://doi.org/10.1007/978-3-030-62223-7_50
Download citation
DOI: https://doi.org/10.1007/978-3-030-62223-7_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-62222-0
Online ISBN: 978-3-030-62223-7
eBook Packages: Computer ScienceComputer Science (R0)