Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243786
|View full text |Cite
|
Sign up to set email alerts
|

HyCC

Abstract: While secure multi-party computation (MPC) is a vibrant research topic and a multitude of practical MPC applications have been presented recently, their development is still a tedious task that requires expert knowledge. Previous works have made first steps in compiling high-level descriptions from various source descriptions into MPC protocols, but only looked at a limited set of protocols. In this work we present HyCC, a tool-chain for automated compilation of ANSI C programs into hybrid protocols that effic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
28
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(29 citation statements)
references
References 50 publications
1
28
0
Order By: Relevance
“…Finally, to demonstrate the practicality of our solver, we provide a toolchain that takes high-level unannotated source-Java source code in our case-, translates it to MPC-source, and outputs optimal protocol assignments. We compare our solver with publicly available benchmarks from [13,5]. We remark that the concrete assignment from [13,5] is known for only a subset of the related benchmarks; for all those we confirm the same (2-out-of-3 protocol) assignment.…”
Section: Our Resultsmentioning
confidence: 65%
See 3 more Smart Citations
“…Finally, to demonstrate the practicality of our solver, we provide a toolchain that takes high-level unannotated source-Java source code in our case-, translates it to MPC-source, and outputs optimal protocol assignments. We compare our solver with publicly available benchmarks from [13,5]. We remark that the concrete assignment from [13,5] is known for only a subset of the related benchmarks; for all those we confirm the same (2-out-of-3 protocol) assignment.…”
Section: Our Resultsmentioning
confidence: 65%
“…However, since the optimal twoprotocol combination can be found in polynomial time, we can use our solver to compute best two-out-of-c protocols combinations for a constant c, by applying it to all possibles pairs of the c protocols, and picking the pair (and the corresponding solution) that minimizes the objective function across all c 2 applications. To demonstrate the quality of our OPA solver, we apply it to compute protocol assignments for known benchmarks from ABY [13] and HyCC [5], for which code has been released namely Modular Exponentiation, Biometric Matching and Private Set Intersection, Convolutional Neural Networks (CNNs) of MiniONN [23] and Crytonets [15], k-means clustering algorithm, DB Merge and DBJoin as well as new ones we introduce, namely Greatest Common Divisor (GCD) and Histogram. We remark that works [13,5] directly compute optimal assignment for three protocols (this is done by manual assignment in [13], and exhaustive search in [5]).…”
Section: Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, only a few specialists can implement MPC now, and this can be a barrier to wide usage in the real world. To break this situation, there are some results on MPC compilers [48], [80], [81]. MPC compilers take a (standard) program code (= function) written by major programming languages (e.g., C, Python) or domain specific language as input, and output a program code for MPC of the same function.…”
Section: Low-cost Implementation and Social Experimentsmentioning
confidence: 99%