|
CMU-ISRI-04-133
Institute for Software Research International
School of Computer Science, Carnegie Mellon University
CMU-ISRI-04-133
The Supply Chain Trading Agent Competition
Raghu Arunachalam, Norman M. Sadeh
September 2004
Also appears as Computer Science Department
Technical Report CMU-CS-04-164
To appear in Electronic Commerce Research & Application
CMU-ISRI-04-133.pdf
Keywords: Multiparty computation, confidentiality, configurable
security, secure list comparison, mali-cious behavior, quasi-commutative
cryptography, communication protocols
Standard multi-party computation models assume semi-honest behavior,
where the majority of participants implement protocols according
to specification, an assumption not always plausible. In this paper
we introduce a multi-party protocol for collaborative data analysis
when participants are malicious and fail to follow specification.
The protocol incorporates a semi-trusted third party, which analyzes
encrypted data and provides honest responses that only intended
recipients can successfully decrypt. The protocol incorporates data
confidentiality by enabling participants to receive encrypted
responses tailored to their own encrypted data submissions without
revealing plaintext to other participants, including the third party.
As opposed to previous models, trust need only be placed on a single
participant with no data at stake. Additionally, the proposed protocol
is configurable in a way that security features are controlled by
independent subproto-cols. Various combinations of subprotocols allow
for a flexible security system, appropriate for a number of
distributed data applications, such as secure list comparison.
20 pages
|