Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR

  • Jie Li*
  • , Okko Makkonen
  • , Camilla Hollanti
  • , Oliver W. Gnilke
  • *Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

6 Citations (Scopus)

Abstract

This work considers the problem of privately outsourcing the computation of a matrix product over a finite field  Fq to N helper servers. These servers are considered to be honest but curious, i.e., they behave according to the protocol but will try to deduce information about the user's data. Furthermore, any set of up to X servers is allowed to share their data. Previous works considered this collusion a hindrance and the download cost of the schemes increases with growing X. We propose to utilize such linkage between servers to the user's advantage by allowing servers to cooperate in the computational task. This leads to a significant gain in the download cost for the proposed schemes. The gain naturally comes at the cost of increased communication load between the servers. Hence, the proposed cooperative schemes can be understood as outsourcing both computational cost and communication cost. Both information-theoretically secure and computationally secure schemes are considered, showing that allowing information leakage that is computationally hard to utilize will lead to further gains. The proposed server cooperation is then exemplified for specific secure distributed matrix multiplication (SDMM) schemes and linear private information retrieval (PIR). Similar ideas naturally apply to many other use cases as well, but not necessarily always with lowered costs.N

Original languageEnglish
Pages (from-to)871-884
Number of pages14
JournalIEEE Journal on Selected Areas in Communications
Volume40
Issue number3
DOIs
Publication statusPublished - 1 Mar 2022
MoE publication typeA1 Journal article-refereed

Keywords

  • Computational security
  • cooperative SDMM
  • information-theoretic security
  • private information retrieval (PIR)
  • secret sharing
  • secure distributed matrix multiplication (SDMM)

Fingerprint

Dive into the research topics of 'Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR'. Together they form a unique fingerprint.
  • Hollanti_ICT: Secure Distributed Computation Schemes with Applications to Digitalized Remote Healthcare

    Hollanti, C. (Principal investigator), Saarela, P. (Project Member), Matala-aho, T. (Project Member), Hieta-aho, E. (Project Member), Karpuk, D. (Project Member), Makkonen, O. (Project Member), Sacikara, E. (Project Member), Kas Hanna, S. (Project Member), Allaix, M. (Project Member), Yatsyna, P. (Project Member), Niemelä, S. (Project Member), Rai, M. (Project Member), Bolaños, W. (Project Member) & Villamizar Rubiano, D. (Project Member)

    01/01/202131/12/2023

    Project: RCF Academy Project

Cite this