2019 IEEE European Symposium on Security and Privacy (EuroS&P) 2019
DOI: 10.1109/eurosp.2019.00043
|View full text |Cite
|
Sign up to set email alerts
|

EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning

Abstract: We present EZPC, a secure two-party computation (2PC) framework that generates efficient 2PC protocols from high-level, easy-to-write programs. EZPC provides formal correctness and security guarantees while maintaining performance and scalability. Previous language frameworks, such as CBMC-GC, ObliVM, SMCL, and Wysteria, generate protocols that use either arithmetic or boolean circuits exclusively. Our compiler is the first to generate protocols that combine both arithmetic and boolean circuits for better perf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
89
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 92 publications
(89 citation statements)
references
References 48 publications
0
89
0
Order By: Relevance
“…§2.2), where the programmer has to manually select the respective protocol per operation. Very recently, the authors of [14] proposed a solution for hybrid compilation of MPC protocols called EzPC. However, while their main motivation is similar to ours, our results differ in several key points.…”
Section: Compilation For Mpcmentioning
confidence: 99%
See 1 more Smart Citation
“…§2.2), where the programmer has to manually select the respective protocol per operation. Very recently, the authors of [14] proposed a solution for hybrid compilation of MPC protocols called EzPC. However, while their main motivation is similar to ours, our results differ in several key points.…”
Section: Compilation For Mpcmentioning
confidence: 99%
“…Previous MPC compilers either only targeted a single class of protocols, e.g., Yao's garbled circuits [26,39,48], the GMW protocol [9,17], or linear secret-sharing-based MPC [7], or the compilers required the developer to use specific annotations to mark which protocol is used for each statement, e.g., [18,24]. The only other compiler that addresses the compilation of a program using two MPC protocols (Yao's gabled circuits and arithmetic sharing) is EzPC [14]. However, EzPC only provides semi-automation for a domain specific language (DSL), as the input code has to be manually decomposed, array accesses have to be manually resolved into multiplexer structures, and the compiled circuits are left unoptimized.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, a new framework for compiling two-party protocols called EzPC [29] was presented. EzPC uses ABY as its cryptographic back-end: a simple and easy-to-use imperative programming language is compiled to ABY input.…”
Section: Related Workmentioning
confidence: 99%
“…The current version of Chameleon does not provide automatic protocol selection. However, the methods of [29,51,73] can be applied in future work in order to automatically partition Chameleon programs.…”
Section: Related Workmentioning
confidence: 99%
“…One example use of MPC is private set intersection (PSI): the x i could be individuals' personal interests, and the function f computes their intersection, revealing which interests the group has in common, but not any interests that they don't. MPC has also been used for auctions [18], detecting tax fraud [16], managing supply chains [33], privacy preserving statistical analysis [31], and more recently for machine learning tasks [19,21,30,38,44].…”
Section: Introductionmentioning
confidence: 99%