PriVeto: a fully private two round veto protocol.

Journal article


Samiran, Bag, Muhammad Ajmal, Azad and Feng, Hao 2018. PriVeto: a fully private two round veto protocol. IET Information Security. https://doi.org/10.1049/iet-ifs.2018.5115
AuthorsSamiran, Bag, Muhammad Ajmal, Azad and Feng, Hao
Abstract

Veto is a prerogative to unilaterally overrule a decision. A private veto protocol consists of a number of participants who wish to decide whether or not to veto a particular motion without revealing the individual opinions. Essentially all participants jointly perform a multi-party computation (MPC) on a boolean-OR function where an input of "1" represents veto and "0" represents not veto. In 2006, Hao and ZieliĀ“ nski presented a two round veto protocol named Anonymous Veto network (AV-net), which is exceptionally efficient in terms of the number of rounds, computation and bandwidth usage. However, AV-net has two generic issues: 1) a participant who has submitted a veto can find out whether she is the only one who vetoed; 2) the last participant who submits her input can pre-compute the boolean-OR result before submission, and may amend her input based on that knowledge. These two issues generally apply to any multi-round veto protocol where participants commit their input in the last round. In this paper, we propose a novel solution to address both issues within two rounds, which are the best possible round efficiency for a veto protocol. Our new private veto protocol, called PriVeto, has similar system complexities to AV-net, but it binds participants to their inputs in the very first round, eliminating the possibility of runtime changes to any of the inputs. At the end of the protocol, participants are strictly limited to learning nothing more than the output of the boolean-OR function and their own inputs.

KeywordsVoting; Veto
Year2018
JournalIET Information Security
PublisherInstitution of Engineering and Technology
ISSN1751-8709
1751-8717
Digital Object Identifier (DOI)https://doi.org/10.1049/iet-ifs.2018.5115
Web address (URL)http://hdl.handle.net/10545/623838
hdl:10545/623838
Publication dates04 Dec 2018
Publication process dates
Deposited12 Jun 2019, 08:36
Accepted30 Nov 2018
Rights

This paper is a postprint of a paper submitted to and accepted for publication in IET Information Security and is subject to Institution of Engineering and Technology Copyright. The copy of record is available at the IET Digital Library.

ContributorsWarwick University and Derby University
File
File Access Level
Open
File
File Access Level
Open
Permalink -

https://repository.derby.ac.uk/item/9411v/priveto-a-fully-private-two-round-veto-protocol

Download files

  • 52
    total views
  • 15
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs)
Zada, Muhammad Sadiq Hassan, Yuan, Bo, Anjum, Ashiq, Azad, Muhammad Ajmal, Khan, Wajahat Ali and Reiff-Marganiec, Stephan 2020. Large-scale Data Integration Using Graph Probabilistic Dependencies (GPDs). IEEE. https://doi.org/10.1109/bdcat50828.2020.00028
Persation: an IoT based personal safety prediction model aided solution
Alofe, Olasunkanmi Matthew, Fatema, Kaniz, Azad, Muhammad Ajmal and Kurugollu, Fatih 2020. Persation: an IoT based personal safety prediction model aided solution. International Journal of Computing and Digital Systems.
Privacy-preserving crowd-sensed trust aggregation in the user-centeric internet of people networks
Azad, Muhammad, Perera, Charith, Bag, Samiran, Barhamgi, Mahmoud and Hao, Feng 2020. Privacy-preserving crowd-sensed trust aggregation in the user-centeric internet of people networks. ACM Transactions on Cyber-Physical Systems. https://doi.org/10.1145/3446431
Designing privacy-aware internet of things applications
Perera, Charith, Barhamgi, Mahmoud, Bandara, Arosha K., Ajmal, Muhammad, Price, Blaine and Nuseibeh, Bashar 2019. Designing privacy-aware internet of things applications. Elsevier Information Sciences. https://doi.org/10.1016/j.ins.2019.09.061
Authentic-caller: Self-enforcing authentication in a next generation network
Azad, Muhammad Ajmal, Bag, Samiran, Perera, Charith, Barhamgi, Mahmoud and Hao, Feng 2019. Authentic-caller: Self-enforcing authentication in a next generation network. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/tii.2019.2941724
CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles
Rathee, Geetanjali, Ahmad, F., Kurugollu, Fatih, Azad, Muhammad, Iqbal, Razi and Imran, Muhammad 2020. CRT-BIoV: A cognitive radio technique for blockchain-enabled internet of vehicles. IEEE Transactions on Intelligent Transportation Systems. https://doi.org/10.1109/TITS.2020.3004718
A first look at privacy analysis of COVID-19 contact tracing mobile applications
Azad, Muhammad Ajmal, Arshad, Junaid, Akmal, Syed Muhammad Ali, Riaz, Farhan, Abdullah, Sidrah, Imran, Muhammad and Ahmad, F. 2020. A first look at privacy analysis of COVID-19 contact tracing mobile applications. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2020.3024180
M2M-REP: Reputation system for machines in the internet of things.
Azad, Muhammad Ajmal, Bag, Samiran, Hao, Feng and Salah, Khaled 2018. M2M-REP: Reputation system for machines in the internet of things. Computers & Security. 79, pp. 1-16. https://doi.org/10.1016/j.cose.2018.07.014
Consumer-facing technology fraud: Economics, attack methods and potential solutions
Mohammed Aamir, Ali, Muhammad AJmal, Azad, Mario Parreno, Centeno, Feng, Hao and Aad Van, Moorsel 2019. Consumer-facing technology fraud: Economics, attack methods and potential solutions. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2019.03.041
TrustVote: Privacy-preserving node ranking in vehicular networks
Muhammad AJmal, Azad, Samiran, Bag, Simon, Parkinson and Feng, Hao 2018. TrustVote: Privacy-preserving node ranking in vehicular networks. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2880839
Pervasive blood pressure monitoring using Photoplethysmogram (PPG) Sensor
Riaz, Farhan, Azad, Muhammad, Arshad, Junaid, Imran, Muhammad, Hassan, Ali and Rehmad, Saad 2019. Pervasive blood pressure monitoring using Photoplethysmogram (PPG) Sensor. Future Generation Computer Systems. https://doi.org/10.1016/j.future.2019.02.032