Information-theoretically secure equality-testing protocol with dispute
resolution
- URL: http://arxiv.org/abs/2212.13346v1
- Date: Tue, 27 Dec 2022 02:56:15 GMT
- Title: Information-theoretically secure equality-testing protocol with dispute
resolution
- Authors: Go Kato, Mikio Fujiwara, and Toyohiro Tsurumaru
- Abstract summary: We define the equality-testing protocol with dispute resolution'' as a new framework.
The most significant difference between our protocol and the previous methods is that we allow the intervention of a trusted third party.
In this new framework, we also present an explicit protocol that is information-theoretically secure and efficient.
- Score: 6.643082745560235
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: There are often situations where two remote users each have data, and wish to
(i) verify the equality of their data, and (ii) whenever a discrepancy is found
afterwards, determine which of the two modified his data. The most common
example is where they want to authenticate messages they exchange. Another
possible example is where they have a huge database and its mirror in remote
places, and whenever a discrepancy is found between their data, they can
determine which of the two users is to blame. Of course, if one is allowed to
use computational assumptions, this function can be realized readily, e.g., by
using digital signatures. However, if one needs information-theoretic security,
there is no known method that realizes this function efficiently, i.e., with
secret key, communication, and trusted third parties all being sufficiently
small. In order to realize this function efficiently with information-theoretic
security, we here define the ``equality-testing protocol with dispute
resolution'' as a new framework. The most significant difference between our
protocol and the previous methods with similar functions is that we allow the
intervention of a trusted third party when checking the equality of the data.
In this new framework, we also present an explicit protocol that is
information-theoretically secure and efficient.
Related papers
- Augmented Shuffle Protocols for Accurate and Robust Frequency Estimation under Differential Privacy [4.527947047128005]
We propose three concrete protocols providing DP and robustness against the two attacks.
Our first protocol generates the number of dummy values for each item from a binomial distribution.
Our second protocol significantly improves the utility of our first protocol by introducing a novel dummy-count distribution.
arXiv Detail & Related papers (2025-04-10T01:06:05Z) - What If the Input is Expanded in OOD Detection? [77.37433624869857]
Out-of-distribution (OOD) detection aims to identify OOD inputs from unknown classes.
Various scoring functions are proposed to distinguish it from in-distribution (ID) data.
We introduce a novel perspective, i.e., employing different common corruptions on the input space.
arXiv Detail & Related papers (2024-10-24T06:47:28Z) - PriRoAgg: Achieving Robust Model Aggregation with Minimum Privacy Leakage for Federated Learning [49.916365792036636]
Federated learning (FL) has recently gained significant momentum due to its potential to leverage large-scale distributed user data.
The transmitted model updates can potentially leak sensitive user information, and the lack of central control of the local training process leaves the global model susceptible to malicious manipulations on model updates.
We develop a general framework PriRoAgg, utilizing Lagrange coded computing and distributed zero-knowledge proof, to execute a wide range of robust aggregation algorithms while satisfying aggregated privacy.
arXiv Detail & Related papers (2024-07-12T03:18:08Z) - Fact Checking Beyond Training Set [64.88575826304024]
We show that the retriever-reader suffers from performance deterioration when it is trained on labeled data from one domain and used in another domain.
We propose an adversarial algorithm to make the retriever component robust against distribution shift.
We then construct eight fact checking scenarios from these datasets, and compare our model to a set of strong baseline models.
arXiv Detail & Related papers (2024-03-27T15:15:14Z) - Binary Classification with Confidence Difference [100.08818204756093]
This paper delves into a novel weakly supervised binary classification problem called confidence-difference (ConfDiff) classification.
We propose a risk-consistent approach to tackle this problem and show that the estimation error bound the optimal convergence rate.
We also introduce a risk correction approach to mitigate overfitting problems, whose consistency and convergence rate are also proven.
arXiv Detail & Related papers (2023-10-09T11:44:50Z) - Exploit the Leak: Understanding Risks in Biometric Matchers [0.0]
In a biometric authentication or identification system, the matcher compares a stored and a fresh template to determine whether there is a match.
For better compliance with privacy legislation, the matcher can be built upon a privacy-preserving distance.
This paper provides an analysis of information leakage during distance evaluation.
arXiv Detail & Related papers (2023-07-25T17:29:32Z) - Untargeted Near-collision Attacks on Biometrics: Real-world Bounds and
Theoretical Limits [0.0]
We focus on untargeted attacks that can be carried out both online and offline, and in both identification and verification modes.
We use the False Match Rate (FMR) and the False Positive Identification Rate (FPIR) to address the security of these systems.
The study of this metric space, and system parameters, gives us the complexity of untargeted attacks and the probability of a near-collision.
arXiv Detail & Related papers (2023-04-04T07:17:31Z) - Pre-trained Encoders in Self-Supervised Learning Improve Secure and
Privacy-preserving Supervised Learning [63.45532264721498]
Self-supervised learning is an emerging technique to pre-train encoders using unlabeled data.
We perform first systematic, principled measurement study to understand whether and when a pretrained encoder can address the limitations of secure or privacy-preserving supervised learning algorithms.
arXiv Detail & Related papers (2022-12-06T21:35:35Z) - DeepSec: Deciding Equivalence Properties for Security Protocols -- Improved theory and practice [8.735998284944436]
We contribute both to the theory and practice of this verification problem.
We establish new complexity results for static equivalence, trace equivalence and labelled bisimilarity.
Our procedure is the first to decide trace equivalence and labelled bisimilarity exactly for a large variety of cryptographic primitives.
arXiv Detail & Related papers (2022-11-06T22:01:04Z) - Mitigating Leakage in Federated Learning with Trusted Hardware [0.0]
In federated learning, multiple parties collaborate in order to train a global model over their respective datasets.
Some partial information may still be leaked across parties if this is done non-judiciously.
We propose two secure versions relying on trusted execution environments.
arXiv Detail & Related papers (2020-11-10T07:22:51Z) - Unsupervised Feature Learning for Event Data: Direct vs Inverse Problem
Formulation [53.850686395708905]
Event-based cameras record an asynchronous stream of per-pixel brightness changes.
In this paper, we focus on single-layer architectures for representation learning from event data.
We show improvements of up to 9 % in the recognition accuracy compared to the state-of-the-art methods.
arXiv Detail & Related papers (2020-09-23T10:40:03Z) - An Accurate, Scalable and Verifiable Protocol for Federated
Differentially Private Averaging [0.0]
We tackle challenges regarding the privacy guarantees provided to participants and the correctness of the computation in the presence of malicious parties.
Our first contribution is a scalable protocol in which participants exchange correlated Gaussian noise along the edges of a network graph.
Our second contribution enables users to prove the correctness of their computations without compromising the efficiency and privacy guarantees of the protocol.
arXiv Detail & Related papers (2020-06-12T14:21:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.