Privacy-preserving multi-party reconciliation secure in the malicious model

Georg Neugebauer, Lucas Brutschy, Ulrike Meyer, Susanne Wetzel

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.

Original languageEnglish
Title of host publicationData Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers
Pages178-193
Number of pages16
DOIs
StatePublished - 2014
Event8th International Workshop on Data Privacy Management, DPM 2013 and 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013 - Egham, United Kingdom
Duration: 12 Sep 201313 Sep 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8247 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Workshop on Data Privacy Management, DPM 2013 and 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013
Country/TerritoryUnited Kingdom
CityEgham
Period12/09/1313/09/13

Keywords

  • Cryptographic protocols
  • Malicious model
  • Privacy-enhancing technologies
  • Secure multi-party computation
  • Zero-knowledge proofs

Fingerprint

Dive into the research topics of 'Privacy-preserving multi-party reconciliation secure in the malicious model'. Together they form a unique fingerprint.

Cite this