Advertisement

Securely Aggregating Testimonies with Threshold Multi-key FHE

  • Gerald GavinEmail author
  • Stephane Bonnevay
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11445)

Abstract

Many data management applications, such as setting up Web portals, managing enterprise data, managing community data, and sharing scientific data, require integrating data from multiple sources. Each of these sources provides a set of values and different sources can often provide conflicting values. To discover the true values, data integration systems should resolve conflicts. In this paper, we present a formal probabilistic framework in the expert/authority setting. Each expert has a partial and maybe imperfect view of a binary target vector \(\varvec{b}\) that an authority wishes recovering. The goal of this paper consists of proposing a multi-party aggregating function of experts’ views to recover \(\varvec{b}\) with an error rate as small as possible. In addition, it is assumed that some of the experts are corrupted by an adversary \(\mathcal {A}\). This adversary controls and coordinates the behavior of the corrupted experts and can thus perturb the aggregating process. In this paper, we present a simple aggregating function and we provide a formal upper-bound over of the output vector error expectation in the worst case, i.e. whatever the behavior of the adversary is. We then propose to securely implement this aggregating function in order to preserve the privacy of experts’ views. A natural secure implementation could be achieved with recent powerful cryptographic tools, i.e. Threshold Multi-key Fully Homomorphic Encryptions schemes (TMFHE). Finally, trade-off between the time complexity and the number of interaction rounds are proposed.

Notes

Acknowledgment

The authors would like to thank the BAG members for their helpful discussions always around a coffee.

References

  1. [AJL+12]
    Asharov, G., Jain, A., López-Alt, A., Tromer, E., Vaikuntanathan, V., Wichs, D.: Multiparty computation with low communication, computation and interaction via threshold FHE. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 483–501. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-29011-4_29CrossRefGoogle Scholar
  2. [BGV12]
    Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, 8–10 January 2012, pp. 309–325 (2012)Google Scholar
  3. [BHP17]
    Brakerski, Z., Halevi, S., Polychroniadou, A.: Four round secure computation without setup. In: Kalai, Y., Reyzin, L. (eds.) TCC 2017. LNCS, vol. 10677, pp. 645–677. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-70500-2_22CrossRefGoogle Scholar
  4. [CDN01]
    Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280–300. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-44987-6_18CrossRefGoogle Scholar
  5. [DBES09]
    Dong, X.L., Berti-Equille, L., Srivastava, D.: Integrating conflicting data: the role of source dependence. Proc. VLDB Endow. 2(1), 550–561 (2009)CrossRefGoogle Scholar
  6. [DN09]
    Dong, X.L., Naumann, F.: Data fusion - resolving data conflicts for integration. PVLDB 2(2), 1654–1655 (2009)Google Scholar
  7. [DP94]
    Dubois, D., Prade, H.: Possibility theory and data fusion in poorly informed environments. Control Eng. Pract. 2(5), 811–823 (1994)CrossRefGoogle Scholar
  8. [DWH08]
    Durrant-Whyte, H., Henderson, T.C.: Multisensor data fusion. In: Siciliano, B., Khatib, O. (eds.) Springer Handbook of Robotics, pp. 585–610. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-30301-5_26CrossRefGoogle Scholar
  9. [Fin77]
    Fine, T.L.: Review: Glenn Shafer, a mathematical theory of evidence. Bull. Am. Math. Soc. 83(4), 667–672 (1977)CrossRefGoogle Scholar
  10. [Gen09]
    Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169–178 (2009)Google Scholar
  11. [GSW13]
    Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, part I. LNCS, vol. 8042, pp. 75–92. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-40041-4_5CrossRefGoogle Scholar
  12. [HLP11]
    Halevi, S., Lindell, Y., Pinkas, B.: Secure computation on the web: computing without simultaneous interaction. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 132–150. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-22792-9_8CrossRefGoogle Scholar
  13. [KKKR13]
    Khaleghi, B., Khamis, A., Karray, F.O., Razavi, S.N.: Multisensor data fusion: a review of the state-of-the-art. Inf. Fusion 14(1), 28–44 (2013)CrossRefGoogle Scholar
  14. [LTV13]
    López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: IACR Cryptology ePrint Archive 2013:94 (2013)Google Scholar
  15. [MW15]
    Mukherjee, P., Wichs, D.: Two round MPC from LWE via multi-key FHE. In: IACR Cryptology ePrint Archive 2015:345 (2015)Google Scholar
  16. [NZZ78]
    Negoita, C.V., Zadeh, L.A., Zimmermann, H.J.: Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets Syst. 1, 3–28 (1978)MathSciNetCrossRefGoogle Scholar
  17. [OSA87]
    Goldreich, O., Michali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218–229 (1987)Google Scholar
  18. [Paw92]
    Pawlak, Z.: Rough Sets: Theoretical Aspects of Reasoning About Data. Kluwer Academic Publishers, Norwell (1992)zbMATHGoogle Scholar
  19. [Reg05]
    Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, 22–24 May 2005, pp. 84–93 (2005)Google Scholar
  20. [She91]
    Sheridan, F.K.J.: A survey of techniques for inference under uncertainty. Artif. Intell. Rev. 5(1–2), 89–119 (1991)CrossRefGoogle Scholar
  21. [Yao86]
    Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986, pp. 162–167 (1986)Google Scholar
  22. [Zad65]
    Zadeh, L.A.: Fuzzy sets. Inf. Control 8(3), 338–353 (1965)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Laboratory ERICUniversity of LyonLyonFrance

Personalised recommendations