PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation

نویسندگان

چکیده

Abstract Secure multi-party computation (MPC) is a promising technique for privacy-persevering applications. A number of MPC frameworks have been proposed to reduce the burden designing customized protocols, allowing non-experts quickly develop and deploy To improve performance, recent allow users declare variables secret only these which are be protected. However, in practice, it usually highly non-trivial specify variables: declaring too many degrades performance while less compromises privacy. address this problem, work we propose an automated security policy synthesis approach as few possible but without compromising security. Our synergistic integration type inference symbolic reasoning. The former able infer sound—but sometimes conservative—security policy, whereas latter allows identify that can declassified precise manner. Moreover, results from reasoning fed back refine types even further. We implement our new tool PoS4MPC . Experimental on five typical applications confirm efficacy approach.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Multi-Party Computation with Security Modules

We consider the problem of secure multi-party computation (SMC) in a new model where individual processes contain a tamper-proof security module. Security modules can be trusted by other processes and can establish secure channels between each other. However, their availability is restricted by their host, i.e., a corrupted party can stop the computation of its own security module as well as dr...

متن کامل

Unconditionally Secure Multi-Party Computation

The most general type of multi-party computation involves n participants. Participant i supplies private data xi and obtains an output function fi(x1, . . . , xn). The computation is said to be unconditionally secure if each participant can verify, with probability arbitrarily close to one, that every other participant obtains arbitrarily little information beyond their agreed output fi. We giv...

متن کامل

Heterogeneous Secure Multi-Party Computation

The increased processing power and storage capacity of inhome and mobile computing devices has motivated their inclusion in distributed and cloud computing systems. The resulting diverse environment creates a strong requirement for secure computations, which can be realised by Secure Multi-Party Computation (MPC). However, MPC most commonly assumes that parties performing the secure computation...

متن کامل

Efficient Secure Multi-party Computation

Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...

متن کامل

Assisting Server for Secure Multi-Party Computation

Distributed threats like botnets are among the most serious threats in the Internet. Due to their distributed nature, these attacks are difficult to detect in an early stage without the collaboration of several network operators. However, the exchange of monitoring data between different parties turns out to be difficult in practice, due to the desire of operators not to disclose network intern...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2022

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-13185-1_19