BIOTERRORISM : CRYPTOGRAPHIC CHALLENGES Sumit Chakraborty Fellow, Indian Institute of Management Calcutta; Bachelor of Electrical Engineering, Jadavpur University, India; E-mail:
[email protected],
[email protected] Abstract: This work defines the security intelligence of a system based on secure multi-party computation in terms of correctness, fairness, rationality, trust, honesty, transparency, accountability, reliability, consistency, confidentiality, data integrity, non-repudiation, authentication, authorization, correct identification, privacy, safety and audit. It defines the security intelligence of a system comprehensively with a novel concept of collective intelligence. The cryptographic notion of security is applied to assess, analyze and mitigate the risks of bio-terrorism today. The definition of bioterrorism has been changed in terms of information security. This work also tries to resolve the conflict between the security intelligence and business intelligence in the context of bio-terrorism and highlights the new cryptographic challenges. Keywords: Security intelligence, Threat analytics, Business intelligence, Cross border bio-terrorism, Secure multi-party computation, Applied cryptography 1. SECURE MULTI-PARTY COMPUTATION Game theory and cryptography are effectively used to understand the strategic moves of intelligent agents having conflicting interests [1]. But, the focus of the two disciplines have different set of goals and formalisms. Traditionally, the basic objective of cryptography is to design secure multiparty computation protocols satisfying the basic properties of information security and privacy. On the other side, algorithmic game theory is applicable to the design of intelligent mechanisms in terms of a set of rational agents, input, output, strategic moves, revelation principle, payment function, incentive, rules of interaction and multi-party negotiation. Traditionally, game theory is applied in management science to define business intelligence. Cryptographic techniques such as secure multi-party computation have been effectively used to solve not only game theoretic problems but also to resolve the conflict between security intelligence and business intelligence of a complex system. Game theoretic concepts are also effectively used in secure and fair computation through rational secret sharing. Let us first focus on the basic properties of secure multi-party computation (SMC). Two or more agents want to conduct a computation based on their private inputs but neither of them wants to share its proprietary data se