2019 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2019
DOI: 10.1109/hst.2019.8740831
|View full text |Cite
|
Sign up to set email alerts
|

MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 26 publications
0
10
0
Order By: Relevance
“…In practice, data is distributed among different parties, in response to the problem of malicious destruction of the integrity of data, Sundari et al [36] expanded the field of secure computing, using secure multiparty computation technology for data integrity protection to prevent general or malicious destruction. Aiming at the strategy of using garbled circuit technology to replace functions only to solve the problem of two-party calculation, Riazi et al [37] extended it on multi-party computation and made some improvements to promote the implementation of scalable SMPC in practice. Due to the abusive use of a lot of data, in order to make the private data use pricing problem, Shen et al [38] used information entropy to quantitatively analyze the private data, so that the use of private data can be effectively and reasonably distributed, and discussed issues such as price measurement of private data.…”
Section: Related Workmentioning
confidence: 99%
“…In practice, data is distributed among different parties, in response to the problem of malicious destruction of the integrity of data, Sundari et al [36] expanded the field of secure computing, using secure multiparty computation technology for data integrity protection to prevent general or malicious destruction. Aiming at the strategy of using garbled circuit technology to replace functions only to solve the problem of two-party calculation, Riazi et al [37] extended it on multi-party computation and made some improvements to promote the implementation of scalable SMPC in practice. Due to the abusive use of a lot of data, in order to make the private data use pricing problem, Shen et al [38] used information entropy to quantitatively analyze the private data, so that the use of private data can be effectively and reasonably distributed, and discussed issues such as price measurement of private data.…”
Section: Related Workmentioning
confidence: 99%
“…In SMPC, parties jointly compute a function over inputs, which the parties keep private. Most SMPC protocols, however, require translating all computations to binary circuits [17]. Employing SMPC for plagiarism detection would thus require new implementations of PD methods.…”
Section: Related Workmentioning
confidence: 99%
“…On one hand, several proposed emerging technologies exploit XOR gates [13], [27], [35], [38]. On the other hand, the growing relevance of cryptography-related applications has revived the interest in XOR gates [22], [26], [27], [33], [36], [37], [38]. For example, in high-level cryptography protocols such as secure multiparty computation, processing XOR gates is convenient since their evaluation is possible without any communication cost [28].…”
Section: Introductionmentioning
confidence: 99%