2020
DOI: 10.2139/ssrn.3680000
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Network Analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 69 publications
0
3
0
Order By: Relevance
“…Prior usage of MPC in financial applications has mainly focused on auctions, such as [5,8,9,29], for one shot auctions, and [4,13,14] for auctions running in Dark Markets. MPC was also used for privacy-preserving financial data analysis, such as [7] to conduct statistics over the performance of companies throughout the year or to compute the systemic risk between financial institutions such as in [2] and [25]. Also, [30] and [19] used MPC for detecting fraud between financial institutions, and [11] used MPC for privacy-preserving federated learning for financial applications.…”
Section: Introductionmentioning
confidence: 99%
“…Prior usage of MPC in financial applications has mainly focused on auctions, such as [5,8,9,29], for one shot auctions, and [4,13,14] for auctions running in Dark Markets. MPC was also used for privacy-preserving financial data analysis, such as [7] to conduct statistics over the performance of companies throughout the year or to compute the systemic risk between financial institutions such as in [2] and [25]. Also, [30] and [19] used MPC for detecting fraud between financial institutions, and [11] used MPC for privacy-preserving federated learning for financial applications.…”
Section: Introductionmentioning
confidence: 99%
“…: Graph analysis techniques are nowadays a crucial tool for financial institutions, serving as a means to identify fraudulent bank accounts, or fraudulent or suspicious transactions (such as transactions related to money laundering). See [24] for a discussion on secure computation technologies applied to financial intelligence sharing, or [15] for a specific example of secure graph analysis for financial stress testing. These techniques help to extract features from a large amount of data, consisting of, for example, money movements between bank accounts.…”
Section: Introductionmentioning
confidence: 99%
“…In settings without any bankruptcy costs, incentives can completely disappear, as shown byRogers & Veraart (2013).37 In addition, the financial organizations involved may be concerned about keeping information about their trading positions and partners private. SeeHastings, Hemenway Falk & Tsoukalas (2020) for a discussion of some related issues, and new methods of obtaining critical network information while preserving privacy.38 SeeAnderson, Erol & Ordoñez (2020) for an analysis showing how growth in shadow banking interacts with interventions within the banking sector, and can exacerbate risk.…”
mentioning
confidence: 99%