Fort M, Freiling F, Draque Penso L, Benenson Z, Kesdogan D (2006)
Publication Type: Conference contribution
Publication year: 2006
Publisher: Springer-verlag
Edited Volumes: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Series: LNCS 4189
City/Town: Hamburg
Pages Range: 34-48
Conference Proceedings Title: Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security
Event location: Hamburg
We study the problem of Secure Multi-party Computation (SMC) in a model where individual processes contain a tamper-proof security module, and introduce the TrustedPals framework, an efficient smart card based implementation of SMC for any number of participating entities in such a model. Security modules can be trusted by other processes and can establish secure channels between each other. However, their availability is restricted by their host, that is, a corrupted party can stop the computation of its own security module as well as drop any message sent by or to its security module. We show that in this model SMC can be implemented by reducing it to a fault-tolerance problem at the level of security modules. Since the critical part of the computation can be executed locally on the smart card, we can compute any function securely with a protocol complexity which is polynomial only in the number of processes (that is, the complexity does not depend on the function which is computed), in contrast to previous approaches. © Springer-Verlag Berlin Heidelberg 2006.
APA:
Fort, M., Freiling, F., Draque Penso, L., Benenson, Z., & Kesdogan, D. (2006). TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. In Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security (pp. 34-48). Hamburg: Hamburg: Springer-verlag.
MLA:
Fort, Milan, et al. "TrustedPals: Secure Multiparty Computation Implemented with Smart Cards." Proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006, Hamburg Hamburg: Springer-verlag, 2006. 34-48.
BibTeX: Download