Resumen
Secure multi-party computation (MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. Information-theoretic secure MPC protocols, though more efficient than their computationally secure counterparts, require at least three computational parties and are prone to collusion attacks. Previous work has used mechanism designs to deter collusion. An important element missing is the consideration of how different players value privacy. In this paper, we provide a detailed analysis of possible outcomes under different privacy preferences based on the relative cost of collusion attacks over loss of privacy. We explicitly calculate the conditions under which honesty is the solution. Simulation results provide further evidence to demonstrate the validity of our mechanism design.
| Idioma original | English |
|---|---|
| Título de la publicación alojada | 2016 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 - Proceedings |
| Páginas | 2044-2048 |
| Número de páginas | 5 |
| ISBN (versión digital) | 9781479999880 |
| DOI | |
| Estado | Published - may 18 2016 |
| Evento | 41st IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 - Shanghai, China Duración: mar 20 2016 → mar 25 2016 |
Serie de la publicación
| Nombre | ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings |
|---|---|
| Volumen | 2016-May |
| ISSN (versión impresa) | 1520-6149 |
Conference
| Conference | 41st IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2016 |
|---|---|
| País/Territorio | China |
| Ciudad | Shanghai |
| Período | 3/20/16 → 3/25/16 |
Nota bibliográfica
Publisher Copyright:© 2016 IEEE.
Financiación
This work was supported in part by the National Science Foundation under Grants 1018241, 1444022, and 1237134.
| Financiadores | Número del financiador |
|---|---|
| National Science Foundation (NSF) | 1237134, 1018241, 1444022 |
ASJC Scopus subject areas
- Software
- Signal Processing
- Electrical and Electronic Engineering
Huella
Profundice en los temas de investigación de 'On privacy preference in collusion-deterrence games for secure multi-party computation'. En conjunto forman una huella única.Citar esto
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver