A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation

被引:5
|
作者
von Maltitz, Marcel [1 ]
Carle, Georg [1 ]
机构
[1] Tech Univ Munich, Dept Informat, Chair Network Architectures & Serv, Munich, Germany
关键词
Cryptography; Secure Multiparty Computation; Privacy; Performance; Resource consumption; Measurement; PRIVACY;
D O I
10.1007/978-3-030-00305-0_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Secure Multiparty Computation (SMC) advanced from a theoretical technique to a practically applicable cryptographic technology. Several frameworks were proposed of which some are still actively developed. We perform a first comprehensive study of performance characteristics of SMC protocols using a promising implementation based on secret sharing, a common and state-of-the-art foundation. We analyze its scalability with respect to environmental parameters as the number of peers and network properties - namely transmission rate, packet loss, network latency - as parameters and execution time, CPU cycles, memory consumption and amount of transmitted data as variables. Our insights on the resource consumption show that such a solution is practically applicable in intranet environments and - with limitations - in Internet settings.
引用
收藏
页码:355 / 372
页数:18
相关论文
共 50 条
  • [21] Sequre: a high-performance framework for secure multiparty computation enables biomedical data sharing
    Haris Smajlović
    Ariya Shajii
    Bonnie Berger
    Hyunghoon Cho
    Ibrahim Numanagić
    Genome Biology, 24
  • [22] Sequre: a high-performance framework for secure multiparty computation enables biomedical data sharing
    Smajlovic, Haris
    Shajii, Ariya
    Berger, Bonnie
    Cho, Hyunghoon
    Numanagic, Ibrahim
    GENOME BIOLOGY, 2023, 24 (01)
  • [23] Secure Computation with Preprocessing via Function Secret Sharing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    THEORY OF CRYPTOGRAPHY, TCC 2019, PT I, 2019, 11891 : 341 - 371
  • [24] Secure Multiparty Computation for Cooperative Cyber Risk Assessment
    Hogan, Kyle
    Luther, Noah
    Schear, Nabil
    Shen, Emily
    Stott, David
    Yakoubov, Sophia
    Yerukhimovich, Arkady
    2016 IEEE CYBERSECURITY DEVELOPMENT (IEEE SECDEV 2016), 2016, : 75 - 76
  • [25] Multiparty quantum secret sharing of secure direct communication using single photons
    Han, Lian-Fang
    Liu, Yi-Min
    Liu, Jun
    Zhang, Zhan-Jun
    OPTICS COMMUNICATIONS, 2008, 281 (09) : 2690 - 2694
  • [26] Secure multiparty quantum secret sharing with the collective eavesdropping-check character
    Gan Gao
    Quantum Information Processing, 2013, 12 : 55 - 68
  • [27] Secure multiparty quantum secret sharing with the collective eavesdropping-check character
    Gao, Gan
    QUANTUM INFORMATION PROCESSING, 2013, 12 (01) : 55 - 68
  • [28] Quantum network based on multiparty quantum secret sharing
    Ma, Hongyang
    Chen, Bingquan
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 347 - +
  • [29] Multiparty quantum secret sharing based on Bell measurement
    Sun, Ying
    Wen, Qiao-yan
    Gao, Fei
    Chen, Xiu-bo
    Zhu, Fu-chen
    OPTICS COMMUNICATIONS, 2009, 282 (17) : 3647 - 3651
  • [30] Dynamic quantum secret sharing between multiparty and multiparty based on single photons
    You, Zhixing
    Wang, Yunran
    Dou, Zhao
    Li, Jian
    Chen, Xiubo
    Li, Lixiang
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2023, 624