2014
DOI: 10.1007/978-3-319-10879-7_22
|View full text |Cite
|
Sign up to set email alerts
|

Systematizing Secure Computation for Research and Decision Support

Abstract: Abstract. We propose a framework for organizing and classifying research results in the active field of secure multiparty computation (MPC). Our systematization of secure computation consists of (1) a set of definitions circumscribing the MPC protocols to be considered; (2) a set of quantitative axes for classifying and comparing MPC protocols; and (3) a knowledge base of propositions specifying the known relations between axis values. We have classified a large number of MPC protocols on these axes and develo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…The underlying implicit assumptions in these frameworks motivate our discussion of the role-based framework in the next section, where these assumptions are made explicit and configurable by the various participating parties. An MPC system should allow solutions to reflect and utilize these asymmetries in a deployment scenario, and to assist in choosing the optimal primitives and protocols used in the system [43].…”
Section: Existing Approaches In Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The underlying implicit assumptions in these frameworks motivate our discussion of the role-based framework in the next section, where these assumptions are made explicit and configurable by the various participating parties. An MPC system should allow solutions to reflect and utilize these asymmetries in a deployment scenario, and to assist in choosing the optimal primitives and protocols used in the system [43].…”
Section: Existing Approaches In Related Workmentioning
confidence: 99%
“…The performance evaluation tool can be utilized to automatically determine which implementation of the primitives to use, or to reduce the number of choices the designer has to manually analyze. There has been recent advances in this direction [43], where a large knowledge base spanning over 180 papers from the literature was compiled in addition to several metrics for comparing MPC protocols.…”
Section: Assisted Designmentioning
confidence: 99%
“…Multi-party computation has been used for privacy-preserving ML [12]. Made possible by a range of cryptographic primitives, MPC [10,11,4] allows multiple parties to compute a function without revealing the inputs of any individual party (beyond what is implied by the output). Several schemes have already been proposed for privacy-preserving FL using MPC [14], but these often take a very long time to train, and may also incur high data-transmission costs.…”
Section: Introductionmentioning
confidence: 99%
“…The authors of Frigate [101] include a short survey of existing MPC frameworks, which focuses on correctness and covers a slightly older body of work. The SSC protocol comparison tool [105], [106], [107] allows users to find published protocols matching certain security or privacy criteria, but this tool classifies theoretical protocols rather than implementations and does not include protocols developed in the past few years. The awesome-mpc repository [115] provides an up-to-date list of compilers, back-ends and special-purpose protocols, with a short description of each.…”
Section: Introductionmentioning
confidence: 99%