An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model

An Entropy-View Secure Multiparty Computation Protocol Based on Semi-Honest Model

Yun Luo, Yuling Chen, Tao Li, Yilei Wang, Yixian Yang, Xiaomei Yu
Copyright: © 2022 |Pages: 17
DOI: 10.4018/JOEUC.306752
Article PDF Download
Open access articles are freely available for download

Abstract

Data interaction scenarios involving multiple parties in network communities have problems of trust, data security, and reliability of the parties, and secure multiparty computation(SMPC) can effectively solve these problems. To address the security and fairness issues of SMPC, this study considers that semi-honest participants can lead to deviations in the security and fairness of the protocol, and combines information entropy and mutual information to present an n-round information exchange protocol in which each participant broadcasts a relevant information value in each round without revealing other information. The uncertainty of the correct outcome value is blurred by the interaction information in each round, and each participant is not sure of the correct outcome value until the end of the protocol, which effectively prevents malicious behavior and ensures the correct execution of the protocol. Security and fairness analysis shows that our protocol guarantees the security and relative fairness of the output obtained by the participants after completing the protocol.
Article Preview
Top

Introduction

In the context of the rapid development of big data, data privacy protection and cybersecurity information on the Internet (Ma et al., 2021; Kou et al., 2021; Chen, Sun, Yang, et al., 2021) have become inevitable issues in the security field, which data from different domains are cross-integrated, each participant forms an interactive scenario for distributed computing in the network communities. This includes cloud computing, edge computing for the Internet of Things (Jerald Nirmal Kumar et al., 2021; Ramu et al., 2020; Li, Wang, Wang, et al., 2020; Wei et al., 2021; Azrour et al., 2021), and secure computation, among others. In the two-party computation, due to insufficient computing power, their own data is encrypted and sent to the second party for computation and return the result value. Multiparty computation occurs when the number of participants increases, and disruption and advocacy actions (Li, Wang, Yang, et al., 2021; Wang, Yang, Bracciali, et al., 2020; Li, Chen, Wang, et al., 2020; Li, Wang, Chen, et al., 2021) occur when multiple parties are involved in the computation. Security and fairness issues will arise during the implementation of the protocol. Integrity and trust (Wang et al., 2021) is an issue that exists among the parties involved, including honest participants, semi-honest participants, and malicious participants (Zhao et al., 2018; Wu et al., 2022; Zhu & Huang, 2022; Zhu, 2021; Gupta & Agarwal, 2021). Malicious participants will deviate from the implementation of the protocol and destroy the protocol in order to maximize their own interests. As in deep learning and machine learning (Chen, Zhang, et al., 2021; Guezzaz et al., 2021), there are many security vulnerabilities and risks of malicious attacks.

Among the three types of participants, the malicious participants have the strongest attack intensity and damage degree. For this type of participant, the current solution is mainly through a trusted third party, and the input is handed over to the trusted third party for calculation. The third parties distribute the corresponding output after calculating. But in many cases, there is no trusted third party, which is similar to the decentralized idea of the blockchain (Wang, Wang, et al., 2020; Li, P., et al., 2020; Zhou et al., 2021). Under the semi-honest model, it is usually not dependent on a trusted third party. The calculation and sending of messages performed by the respective participants raise the issue of security and fairness. This problem is closely related to the subjective consciousness of the participants, and there will also be certain game situations between parties, which may cause the protocol to deviate. In order to eliminate these negative effects, this paper designs an n-round interactive protocol scheme based on information entropy under the semi-honest model to achieve the security and fairness of the SMPC protocol.

Complete Article List

Search this Journal:
Reset
Volume 36: 1 Issue (2024)
Volume 35: 3 Issues (2023)
Volume 34: 10 Issues (2022)
Volume 33: 6 Issues (2021)
Volume 32: 4 Issues (2020)
Volume 31: 4 Issues (2019)
Volume 30: 4 Issues (2018)
Volume 29: 4 Issues (2017)
Volume 28: 4 Issues (2016)
Volume 27: 4 Issues (2015)
Volume 26: 4 Issues (2014)
Volume 25: 4 Issues (2013)
Volume 24: 4 Issues (2012)
Volume 23: 4 Issues (2011)
Volume 22: 4 Issues (2010)
Volume 21: 4 Issues (2009)
Volume 20: 4 Issues (2008)
Volume 19: 4 Issues (2007)
Volume 18: 4 Issues (2006)
Volume 17: 4 Issues (2005)
Volume 16: 4 Issues (2004)
Volume 15: 4 Issues (2003)
Volume 14: 4 Issues (2002)
Volume 13: 4 Issues (2001)
Volume 12: 4 Issues (2000)
Volume 11: 4 Issues (1999)
Volume 10: 4 Issues (1998)
Volume 9: 4 Issues (1997)
Volume 8: 4 Issues (1996)
Volume 7: 4 Issues (1995)
Volume 6: 4 Issues (1994)
Volume 5: 4 Issues (1993)
Volume 4: 4 Issues (1992)
Volume 3: 4 Issues (1991)
Volume 2: 4 Issues (1990)
Volume 1: 3 Issues (1989)
View Complete Journal Contents Listing