2022
DOI: 10.1007/978-3-030-95312-6_5
|View full text |Cite
|
Sign up to set email alerts
|

Private Liquidity Matching Using MPC

Abstract: Many central banks, as well as blockchain systems, are looking into distributed versions of interbank payment systems, in particular the netting procedure. When executed in a distributed manner this presents a number of privacy problems. This paper studies a privacypreserving netting protocol to solve the gridlock resolution problem in such Real Time Gross Settlement systems. Our solution utilizes Multiparty Computation and is implemented in the SCALE MAMBA system, using Shamir secret sharing scheme over three… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…While using large amounts of user data creates new possibilities, such as in the health industry and for machine learning [64], doing so plainly compromises users' privacy to the point where it might even be against the law because of regulations like the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act [42], [84]. Secure multi-party computation techniques (MPC) [39], [88] have demonstrated their ability to address this problem efficiently in a variety of real-world applications, including financial services [7], epidemiological modeling [41], privacypreserving machine learning [13], [24], [43], [51], [55],…”
Section: Introductionmentioning
confidence: 99%
“…While using large amounts of user data creates new possibilities, such as in the health industry and for machine learning [64], doing so plainly compromises users' privacy to the point where it might even be against the law because of regulations like the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act [42], [84]. Secure multi-party computation techniques (MPC) [39], [88] have demonstrated their ability to address this problem efficiently in a variety of real-world applications, including financial services [7], epidemiological modeling [41], privacypreserving machine learning [13], [24], [43], [51], [55],…”
Section: Introductionmentioning
confidence: 99%
“…We refer the reader to [16,17] for more MPC libraries and the comparison of known libraries. Many applications can be built upon MPC to protect the privacy of data, including machine learning (see, e.g., [18][19][20][21][22][23][24][25][26][27][28][29][30][31] and references therein), federated learning (see, e.g., [32][33][34][35][36]), data mining [37][38][39][40], auction [41][42][43], genomic analysis [44][45][46], securing databases (see [47] and references therein), and blockchain [48][49][50][51][52][53]. In addition, some techniques underlying MPC protocols can also be used to construct non-interactive zero-knowledge (ZK) proofs [54][55][56][57][58][59][60][61] based on the MPC-in-thehead paradigm, scalable ZK proofs…”
Section: Introductionmentioning
confidence: 99%