Abstract
Finite State Machine (FSM) is a mathematical model of computation. FSM is often used to model the systems as a sequence of states and actions. The state captures the behavior of the system, and transition represents the action in the system. This paper presents a mechanism of privately evaluating FSM in the presence of the semi-honest adversary. We consider a set of mutually distrustful parties who want to evaluate a string on a FSM. Both the FSM and the input string are shared among the parties using a threshold secret sharing mechanism. Party individually does not know the FSM nor the input. Multiparty computation allows the parties to process the string on the FSM, collaboratively. During the execution, parties learn nothing more than the acceptance of the string.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
A genetic marker is a gene or DNA sequence with a known location on a chromosome that can be used to identify individuals or species.
- 2.
Shares by a threshold secret sharing scheme.
- 3.
The sequence of states due to the transitions remain secret.
- 4.
For every state \(q_i \in Q\) and \(a\in \varSigma \), there is a transition in the FSM. If the FSM is not complete, one can add a sink state \(q_s\) and define transitions towards the \(q_s\) state.
- 5.
The basic operation includes either PSS, PBS, sharing secret, multiplication or revealing secret. Multiple basic operations are often performed in parallel and considered as one round.
References
Abe, M., Suzuki, K.: Receipt-free sealed-bid auction. In: Chan, A.H., Gligor, V. (eds.) ISC 2002. LNCS, vol. 2433, pp. 191–199. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45811-5_14
Al-Riyami, S.S.: Cryptographic schemes based on elliptic curve pairings. Ph.D. thesis, Royal Holloway, University of London, UK (2004)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-40061-5_29
Aliasgari, M., Blanton, M.: Secure computation of hidden Markov models. In: 10th International Conference on Security and Cryptography SECRYPT 2013, pp. 242–253. SciTePress (2013)
Aliasgari, M., Blanton, M., Bayatbabolghani, F.: Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model. Int. J. Inf. Secur. 16(6), 577–601 (2017)
Asharov, G., Lindell, Y., Rabin, T.: Perfectly-secure multiplication for any \(t<n/3\). In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-22792-9_14
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th Annual ACM Symposium on Theory of Computing, pp. 1–10. ACM (1988)
Blake, I.F., Gao, S., Lambert, R.: Constructive problems for irreducible polynomials over finite fields. In: Gulliver, T.A., Secord, N.P. (eds.) ITA 1993. LNCS, vol. 793, pp. 1–23. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-57936-2_27
blockgeeks.com: A beginner’s guide to smart contacts. https://blockgeeks.com/guides/smart-contract/
Bogetoft, P., et al.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325–343. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03549-4_20
Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, pp. 136–145. IEEE Computer Society (2001)
Damgård, I., Keller, M.: Secure multiparty AES (full paper). IACR Cryptology ePrint Archive, 2009/614 (2009)
Frikken, K.B.: Practical private DNA string searching and matching through efficient oblivious automata evaluation. In: Gudes, E., Vaidya, J. (eds.) DBSec 2009. LNCS, vol. 5645, pp. 81–94. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03007-9_6
Gennaro, R., Rabin, M.O., Rabin, T.: Simplified VSS and fact-track multiparty computations with applications to threshold cryptography. In: 17th Annual ACM Symposium on Principles of Distributed Computing, PODC 1998, pp. 101–111. ACM (1998)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: 19th Annual ACM Symposium on Theory of Computing, pp. 218–229. ACM (1987)
Graham, R.D., Johnson, P.C.: Finite state machine parsing for internet protocols: faster than you think. In: IEEE Security and Privacy Workshops, SPW 2014, pp. 185–190. IEEE Computer Society (2014)
Harkavy, M., Tygar, J.D., Kikuchi, H.: Electronic auctions with private bids. In: 3rd USENIX Workshop on Electronic Commerce. USENIX Association (1998)
Liaw, H.-T.: A secure electronic voting protocol for general elections. Comput. Secur. 23(2), 107–119 (2004)
Mavridou, A., Laszka, A.: Designing secure ethereum smart contracts: a finite state machine based approach. CoRR, abs/1711.09327 (2017)
Mavridou, A., Laszka, A.: Tool demonstration: FSolidM for designing secure ethereum smart contracts. In: Bauer, L., Küsters, R. (eds.) POST 2018. LNCS, vol. 10804, pp. 270–277. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-89722-6_11
Mitrou, L., Gritzalis, D., Katsikas, S.K.: Revisiting legal and regulatory requirements for secure E-Voting. In: International Conference on Information Security (SEC 2002), pp. 469–480. Kluwer (2002)
Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: 12th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2001, pp. 448–457. Society for Industrial and Applied Mathematics (2001)
Nargis, I., Mohassel, P., Eberly, W.: Efficient multiparty computation for arithmetic circuits against a covert majority. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 260–278. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38553-7_15
Nguyen, H.X., Roughan, M.: Multi-observer privacy-preserving hidden Markov models. IEEE Trans. Signal Process. 61(23), 6010–6019 (2013)
Rabin, M.O.: How to exchange secrets with oblivious transfer (2005). http://eprint.iacr.org/2005/187
Sasakawa, H., Harada, H., duVerle, D., Arimura, H., Tsuda, K., Sakuma, J.: Oblivious evaluation of non-deterministic finite automata with application to privacy-preserving virus genome detection. In: 13th Workshop on Privacy in the Electronic Society, WPES 2014, pp. 21–30. ACM, New York (2014)
Seroussi, G.: Table of low-weight binary irreducible polynomials. Computer Systems Laboratory, Hewlett-Packard Company, August 1998
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Troncoso-Pastoriza, J.R., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient DNA searching through oblivious automata. In: 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 519–528. ACM (2007)
Yao, A.C.C.: Protocols for secure computations (extended abstract). In: 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164. IEEE Computer Society (1982)
Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: 27th Annual Symposium on Foundations of Computer Science, pp. 162–167. IEEE Computer Society (1986)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mardi, D., Howlader, J. (2019). Multiparty Evaluation of Finite State Machine. In: Nandi, S., Jinwala, D., Singh, V., Laxmi, V., Gaur, M., Faruki, P. (eds) Security and Privacy. ISEA-ISAP 2019. Communications in Computer and Information Science, vol 939. Springer, Singapore. https://doi.org/10.1007/978-981-13-7561-3_17
Download citation
DOI: https://doi.org/10.1007/978-981-13-7561-3_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7560-6
Online ISBN: 978-981-13-7561-3
eBook Packages: Computer ScienceComputer Science (R0)