University of Leicester
Browse
art_10.1007%2Fs00500-018-3342-3.pdf (434.73 kB)

Incentive-driven attacker for corrupting two-party protocols

Download (434.73 kB)
journal contribution
posted on 2018-07-25, 13:40 authored by Yilei Wang, Roberto Metere, Huiyu Zhou, Guanghai Cui, Tao Li
Adversaries in two-party computation may sabotage a protocol, leading to possible collapse of the information security management. In practice, attackers often breach security protocols with specific incentives. For example, attackers manage to reap additional rewards by sabotaging computing tasks between two clouds. Unfortunately, most of the existing research works neglect this aspect when discussing the security of protocols. Furthermore, the construction of corrupting two parties is also missing in two-party computation. In this paper, we propose an incentive-driven attacking model where the attacker leverages corruption costs, benefits and possible consequences. We here formalize the utilities used for two-party protocols and the attacker(s), taking into account both corruption costs and attack benefits. Our proposed model can be considered as the extension of the seminal work presented by Groce and Katz (Annual international conference on the theory and applications of cryptographic techniques, Springer, Berlin, pp 81–98, 2012), while making significant contribution in addressing the corruption of two parties in two-party protocols. To the best of our knowledge, this is the first time to model the corruption of both parties in two-party protocols.

Funding

This study was funded by National Natural Science Foundation of China (Grant Number: 61502218, 61771231), Natural Science Foundation of Shandong Province (Grant Number: ZR2017MF010, ZR2017MF062), H. Zhou was funded by EU H2020 DOMINOES Project (Grant Number: 771066).

History

Citation

Soft Computing, 2018

Author affiliation

/Organisation/COLLEGE OF SCIENCE AND ENGINEERING/Department of Informatics

Version

  • VoR (Version of Record)

Published in

Soft Computing

Publisher

Springer Verlag (Germany)

issn

1432-7643

eissn

1433-7479

Acceptance date

2018-06-22

Copyright date

2018

Available date

2018-07-25

Publisher version

https://link.springer.com/article/10.1007/s00500-018-3342-3

Language

en

Usage metrics

    University of Leicester Publications

    Categories

    Licence

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC