High-Precision Secure Computation of Satellite Collision Probabilities

The costs of designing, building, launching and maintaining satellites make satellite operators extremely motivated to protect their on-orbit assets. Unfortunately, privacy concerns present a serious barrier to coordination between different operators. One obstacle to improving safety arises because...

Full description

Saved in:
Bibliographic Details
Published inSecurity and Cryptography for Networks pp. 169 - 187
Main Authors Hemenway, Brett, Lu, Steve, Ostrovsky, Rafail, Welser IV, William
Format Book Chapter
LanguageEnglish
Published Cham Springer International Publishing 2016
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The costs of designing, building, launching and maintaining satellites make satellite operators extremely motivated to protect their on-orbit assets. Unfortunately, privacy concerns present a serious barrier to coordination between different operators. One obstacle to improving safety arises because operators view the trajectories of their satellites as private, and refuse to share this private information with other operators. Without data-sharing, preventing collisions between satellites becomes a challenging task. A 2014 report from the RAND Corporation proposed using cryptographic tools from the domain of secure Multiparty Computation (MPC) to allow satellite operators to calculate collision probabilities (conjunction analyses) without sharing private information about the trajectories of their satellites. In this work, we report on the design and implementation of a new MPC framework for high-precision arithmetic on real-valued variables in a two-party setting where, unlike previous works, there is no honest majority, and where the players are not assumed to be semi-honest. We show how to apply this new solution in the domain of securely computing conjunction analyses. Our solution integrates the integer-based Goldreich-Micali-Wigderson (GMW) protocol and Garbled Circuits (GC). We prove security of our protocol in the two party, semi-honest setting, assuming only the existence of one-way functions and Oblivious Transfer (the OT-hybrid model). The protocol allows a pair of satellite operators to compute the probability that their satellites will collide without sharing their underlying private orbital information. Techniques developed in this paper would potentially have a wide impact on general secure numerical analysis computations. We also show how to strengthen our construction with standard arithmetic message-authentication-codes (MACs) to enforce honest behavior beyond the semi-honest setting. Computing a conjunction analysis requires numerically estimating a complex triple integral to a high degree of precision. The complexity of the calculation, and the possibility of numeric instability presents many challenges for MPC protocols which typically model calculations as simple (integer) arithmetic or binary circuits. Our secure numerical integration routines are extremely stable and efficient, and our secure conjunction analysis protocol takes only a few minutes to run on a commodity laptop. The full version appears in [HLOW16].
AbstractList The costs of designing, building, launching and maintaining satellites make satellite operators extremely motivated to protect their on-orbit assets. Unfortunately, privacy concerns present a serious barrier to coordination between different operators. One obstacle to improving safety arises because operators view the trajectories of their satellites as private, and refuse to share this private information with other operators. Without data-sharing, preventing collisions between satellites becomes a challenging task. A 2014 report from the RAND Corporation proposed using cryptographic tools from the domain of secure Multiparty Computation (MPC) to allow satellite operators to calculate collision probabilities (conjunction analyses) without sharing private information about the trajectories of their satellites. In this work, we report on the design and implementation of a new MPC framework for high-precision arithmetic on real-valued variables in a two-party setting where, unlike previous works, there is no honest majority, and where the players are not assumed to be semi-honest. We show how to apply this new solution in the domain of securely computing conjunction analyses. Our solution integrates the integer-based Goldreich-Micali-Wigderson (GMW) protocol and Garbled Circuits (GC). We prove security of our protocol in the two party, semi-honest setting, assuming only the existence of one-way functions and Oblivious Transfer (the OT-hybrid model). The protocol allows a pair of satellite operators to compute the probability that their satellites will collide without sharing their underlying private orbital information. Techniques developed in this paper would potentially have a wide impact on general secure numerical analysis computations. We also show how to strengthen our construction with standard arithmetic message-authentication-codes (MACs) to enforce honest behavior beyond the semi-honest setting. Computing a conjunction analysis requires numerically estimating a complex triple integral to a high degree of precision. The complexity of the calculation, and the possibility of numeric instability presents many challenges for MPC protocols which typically model calculations as simple (integer) arithmetic or binary circuits. Our secure numerical integration routines are extremely stable and efficient, and our secure conjunction analysis protocol takes only a few minutes to run on a commodity laptop. The full version appears in [HLOW16].
Author Welser IV, William
Lu, Steve
Ostrovsky, Rafail
Hemenway, Brett
Author_xml – sequence: 1
  givenname: Brett
  surname: Hemenway
  fullname: Hemenway, Brett
  email: fbrett@cis.upenn.edu
  organization: University of Pennsylvania, Philadelphia, USA
– sequence: 2
  givenname: Steve
  surname: Lu
  fullname: Lu, Steve
  email: steve@stealthsoftwareinc.com
  organization: Stealth Software Technologies, Inc., Los Angeles, USA
– sequence: 3
  givenname: Rafail
  surname: Ostrovsky
  fullname: Ostrovsky, Rafail
  email: rafail@cs.ucla.edu
  organization: University of California, Los Angeles, USA
– sequence: 4
  givenname: William
  surname: Welser IV
  fullname: Welser IV, William
  email: bwelser@rand.org
  organization: RAND Corporation, Santa Monica, USA
BookMark eNo1UMtOAyEURa2JndovcNMfQIGLPJamsdakiU2qa8IwUKnj0AzT_5eOujo5j3uTcyo06VLnEbqj5J4SIh-0VBgwUI05F1RhbfQFqqAII3-8RFMqKMUAXF-heYn_e5JN0JQAYVhLDjeoyvlACGFSsylareP-E29772KOqVvsvDv1frFM38fTYIezlMJiZwfftnE4GwXH5LZPta1jUaPPt-g62Db7-R_O0Mfq-X25xpu3l9fl0wYfmIAB86ap6-B0UC4IH4QCSzhnELi1VtSuASelg2Ch4Z44xakWjJYe1CrhtIcZor9_87GP3d73pk7pKxtKzHklU2obMOXAjKuYshL8AMq-WSQ
ContentType Book Chapter
Copyright Springer International Publishing Switzerland 2016
Copyright_xml – notice: Springer International Publishing Switzerland 2016
DOI 10.1007/978-3-319-44618-9_9
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 3319446185
9783319446189
EISSN 1611-3349
Editor De Prisco, Roberto
Zikas, Vassilis
Editor_xml – sequence: 1
  givenname: Vassilis
  surname: Zikas
  fullname: Zikas, Vassilis
  email: vzikas@cs.rpi.edu
– sequence: 2
  givenname: Roberto
  surname: De Prisco
  fullname: De Prisco, Roberto
  email: robdep@unisa.it
EndPage 187
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-j263t-4ddbbfc9f8cf6ef683a04423f4aaa6bcd3c77c3fa3d4e0c84196213191a86c9e3
ISBN 9783319446172
3319446177
ISSN 0302-9743
IngestDate Tue Jul 29 20:13:37 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-j263t-4ddbbfc9f8cf6ef683a04423f4aaa6bcd3c77c3fa3d4e0c84196213191a86c9e3
Notes B. Hemenway—Work done while consulting for RAND Corporation. R. Ostrovsky—Work done while consulting for Stealth Software Technologies, Inc.
PageCount 19
ParticipantIDs springer_books_10_1007_978_3_319_44618_9_9
PublicationCentury 2000
PublicationDate 2016
PublicationDateYYYYMMDD 2016-01-01
PublicationDate_xml – year: 2016
  text: 2016
PublicationDecade 2010
PublicationPlace Cham
PublicationPlace_xml – name: Cham
PublicationSeriesSubtitle Security and Cryptology
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSeriesTitleAlternate Lect.Notes Computer
PublicationSubtitle 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings
PublicationTitle Security and Cryptography for Networks
PublicationYear 2016
Publisher Springer International Publishing
Publisher_xml – name: Springer International Publishing
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Steffen, Bernhard
Pandu Rangan, C.
Kanade, Takeo
Kittler, Josef
Weikum, Gerhard
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, United Kingdom
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, United Kingdom
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: CNB H 104.2, ETH Zurich, Zürich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Madras, Indian Institute of Technology, Chennai, India
– sequence: 9
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: Fakultät Informatik, TU Dortmund, Dortmund, Germany
– sequence: 10
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 11
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 12
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max Planck Institute for Informatics, Saarbrücken, Germany
SSID ssj0002792
ssj0001720393
Score 2.1956918
Snippet The costs of designing, building, launching and maintaining satellites make satellite operators extremely motivated to protect their on-orbit assets....
SourceID springer
SourceType Publisher
StartPage 169
SubjectTerms Conjunction Analysis
Multiplication Gate
Oblivious Transfer
Satellite Operator
Secure Computation
Title High-Precision Secure Computation of Satellite Collision Probabilities
URI http://link.springer.com/10.1007/978-3-319-44618-9_9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07b9swECYcdyk6tOkDTV_g0CmGCsukSHroUAQJnCB1gjZJswkURQ4Z7ECWE6Q_pb-2dyQly06WZBEEQdDjPul4_PjdHSFftbNMMlxhBMQTXmbDRCtlE6mxjg6MCUWG-c4_p2Jyzo8us8te719HtbSsi2_m74N5JU9BFY4Brpgl-whk24vCAdgHfGELCMN2I_hdp1lDDkfsPOfp_73q7rqO1ae9cnAa5N1txDxBGvBWh7bSKM5tlTjLKPa6aSE-WdTV_Cayqr-068gw_uBQWg0OL7w2L3A13a8OZSPJaRUb9wQ23w5C64g2OP2tfRnQ2nraIpx5WoFj8ULdRtWIFrSL78dxkWM6r712bND0oWjcUpe3SDd5i4a33GA-V-Tb2kSXgaeAiWsqu1woA2cO06HgH23w3wKrMrJQBTX65DT0gonDexrG93sjR1csgoldeDcYCvLxFtmSKuuTZz_2j44vVvwdrl93cnCxEGNYsQoPhXlEzUPLUOlp9RJt-atQ4XjjjvcW5X2sc_aKvMD8F4qJKWCybdKzs9fkZWN1Gq3-hhysY00D1rSDNZ072mJNW6zpGtZvyfnB_tneJIldOZKrkWA1_M9lUTgzdso4YZ1QTA85BOWOa61FYUpmpDTMaVZyOzSKg48fpfCCqVbCjC17R_qz-cy-J9SWciwUBLBcOc5LVvARL4VwuLYvC5PtkN3GEDn-Z4u8KbINVstZDhfNvdVysNqHx5z8kTxffZOfSL-ulvYzRJd18SUC_R_dmnTG
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Security+and+Cryptography+for+Networks&rft.au=Hemenway%2C+Brett&rft.au=Lu%2C+Steve&rft.au=Ostrovsky%2C+Rafail&rft.au=Welser+IV%2C+William&rft.atitle=High-Precision+Secure+Computation+of+Satellite+Collision+Probabilities&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2016-01-01&rft.pub=Springer+International+Publishing&rft.isbn=9783319446172&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=169&rft.epage=187&rft_id=info:doi/10.1007%2F978-3-319-44618-9_9
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon