2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00028
|View full text |Cite
|
Sign up to set email alerts
|

SoK: General Purpose Compilers for Secure Multi-Party Computation

Abstract: Secure multi-party computation (MPC) allows a group of mutually distrustful parties to compute a joint function on their inputs without revealing any information beyond the result of the computation. This type of computation is extremely powerful and has wide-ranging applications in academia, industry, and government. Protocols for secure computation have existed for decades, but only recently have general-purpose compilers for executing MPC on arbitrary functions been developed. These projects rapidly improve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
61
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 104 publications
(61 citation statements)
references
References 111 publications
0
61
0
Order By: Relevance
“…Thus, some compilers aim to generate the smallest circuit possible, whereas others aim to generate a circuit with the lowest depth. See Hastings et al 19 for a survey on general-purpose compilers for MPC and their usability. The combination of these advancements led to performance improvements of many orders of magnitude in just a few years, paving the way for MPC to be fast enough to be used in practice for a wide variety of problems.…”
Section: Feasibility Of Mpcmentioning
confidence: 99%
“…Thus, some compilers aim to generate the smallest circuit possible, whereas others aim to generate a circuit with the lowest depth. See Hastings et al 19 for a survey on general-purpose compilers for MPC and their usability. The combination of these advancements led to performance improvements of many orders of magnitude in just a few years, paving the way for MPC to be fast enough to be used in practice for a wide variety of problems.…”
Section: Feasibility Of Mpcmentioning
confidence: 99%
“…Recent years have seen a proliferation of work applying MPC to real-world problems, with [4] an excellent overview. This work has been enabled by developments in the efficiency of primitives [6,34,39,41,58], by the creation of usable compilers and software libraries -see [31] for a comprehensive SoK -and by increased research interest in the definition of tailored protocols. Our work fits into this narrative that MPC is practical and valuable to privacy-conscious settings [49].…”
Section: Related Workmentioning
confidence: 99%
“…The other most important protocols are n, f, passive security, abort active security and fault tolerance active security. n represents the number of computing parties involved, f represents the maximum number of computing parties allowed to regulate and run the protocol intended in which f+1 will be a violation of the system, passive security provides a guarantee to the privacy of source data such as the number of computation parties involved, abort active security ensures that corrupt computational parties run the purported protocol and faulty tolerance active security has the role of ensuring continuous operation of the system even in instances when the computational parties have ceased to operate correctly [5]. Figure 2, shows the structure of a secure MPC and how the various parties involved compute a function using their inputs, while keeping these inputs private [14].…”
Section: Managing Threat Complexities In Secure Multiparty Computatiomentioning
confidence: 99%