MPClan: Protocol Suite for Privacy-Conscious Computations

نویسندگان

چکیده

Abstract The growing volumes of data being collected and its analysis to provide better services are creating worries about digital privacy. To address privacy concerns give practical solutions, the literature has relied on secure multiparty computation techniques. However, recent research over rings mostly focused small-party honest-majority setting up four parties tolerating single corruption, noting efficiency concerns. In this work, we extend strategies support higher resiliency in an with online phase at centre stage. Our semi-honest protocol improves communication Damgård Nielsen (CRYPTO’07) without inflating overall communication. It also allows shutting down almost half phase, thereby saving 50% system’s operational costs. maliciously enjoys similar benefits requires only parties, except for one-time verification towards end, provides security fairness. showcase practicality designed protocols, benchmark popular applications such as deep neural networks, graph genome sequence matching, biometric matching using prototype implementations. addition improved communication, aid bringing 60–80% savings monetary cost prior work.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

H.323 protocol suite

Multimedia communication has affected various areas of people’s life. Correspondingly numerous standards, communication technology and networks of multimedia from different vendors are evolving rapidly. The H.323 protocol suite was specified by ITU is a main technology for real-time communication of audio, video, and data packet switched networks. It also specifies the interoperability between ...

متن کامل

Privacy Homomorphism for Delegation of the Computations

The idea of privacy homomorphism (PH) was firstly introduced by Rivest, Adleman and Dertouzos [1]. They proposed several PHs to process encrypted data without decrypting. A PH is an encryption function which allows the processing the encrypted data without decryption. Formally privacy homomorphism can be defined as an encryption function e which has efficient algorithms to compute e (xy) and e ...

متن کامل

Privacy-Preserving Cooperative Scientific Computations

The growth of the Internet has triggered tremendous opportunities for cooperative computation, in which multiple parties need to jointly conduct computation tasks based on the private inputs they each supply. These computations could occur between mutually untrusted parties, or even between competitors. For example, two competing financial organizations might jointly invest in a project that mu...

متن کامل

Privacy-Conscious Information Diffusion in Social Networks

We present RIPOSTE, a distributed algorithm for disseminating information (ideas, news, opinions, or trends) in a social network. RIPOSTE ensures that information spreads widely if and only if a large fraction of users find it interesting, and this is done in a “privacy-conscious” manner, namely without revealing the opinion of any individual user. Whenever an information item is received by a ...

متن کامل

Privacy-Preserving Secret Shared Computations using MapReduce

Data outsourcing allows data owners to keep their data at untrusted clouds that do not ensure the privacy of data and/or computations. One useful framework for fault-tolerant data processing in a distributed fashion is MapReduce, which was developed for trusted private clouds. This paper presents algorithms for data outsourcing based on Shamir’s secret-sharing scheme and for executing privacy-p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Cryptology

سال: 2023

ISSN: ['0933-2790', '1432-1378']

DOI: https://doi.org/10.1007/s00145-023-09469-z