Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation

In this paper we consider the problem of n agents wishing to perform a given computation on common inputs in a privacy preserving manner, in the sense that even if the entire memory contents of some of them are exposed, no information is revealed about the state of the computation, and where there is no a priori bound on the number of inputs. The problem has received ample attention recently in the context of swarm computing and Unmanned Aerial Vehicles (UAV) that collaborate in a common mission, and schemes have been proposed that achieve this notion of privacy for arbitrary computations, at the expense of one round of communication per input among the n agents. In this work we show how to avoid communication altogether during the course of the computation, with the trade- ofi of computing a smaller class of functions, namely, those carried out by flnite state automata. Our scheme, which is based on a novel combination of secret-sharing techniques and the Krohn-Rhodes decomposition of flnite state automata, achieves the above goal in an information-theoretically secure manner, and, furthermore, does not require randomness during its execution.

[1]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[2]  Moti Yung,et al.  Perfectly secure message transmission , 1993, JACM.

[3]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[4]  Moti Yung,et al.  Secret swarm unit: Reactive k-secret sharing , 2012, Ad Hoc Networks.

[5]  Birgit Pfitzmann,et al.  Composition and integrity preservation of secure reactive systems , 2000, CCS.

[6]  Shlomi Dolev,et al.  Swarming secrets , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[7]  Allan Tomlinson,et al.  Survey on Security Challenges for Swarm Robotics , 2009, 2009 Fifth International Conference on Autonomic and Autonomous Systems.

[8]  H. P. Zeige,et al.  Cascade Synthesis of Finite-State Machines , 2004 .

[9]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[10]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[11]  Mitsuru Ito,et al.  Secret sharing scheme realizing general access structure , 1989 .

[12]  J. Rhodes,et al.  Algebraic theory of machines. I. Prime decomposition theorem for finite semigroups and machines , 1965 .

[13]  Yvo Desmedt,et al.  Perfectly Secure Message Transmission , 2011, Encyclopedia of Cryptography and Security.

[14]  Moni Naor,et al.  Adaptively secure multi-party computation , 1996, STOC '96.

[15]  Chrystopher L. Nehaniv,et al.  Algebraic Theory of Automata Networks (SIAM Monographs on Discrete Mathematics and Applications, 11) , 2004 .

[16]  David Chaum,et al.  Multiparty Unconditionally Secure Protocols (Extended Abstract) , 1988, STOC.