A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation

被引:5
作者
von Maltitz, Marcel [1 ]
Carle, Georg [1 ]
机构
[1] Tech Univ Munich, Dept Informat, Chair Network Architectures & Serv, Munich, Germany
来源
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY | 2018年 / 11025卷
关键词
Cryptography; Secure Multiparty Computation; Privacy; Performance; Resource consumption; Measurement; PRIVACY;
D O I
10.1007/978-3-030-00305-0_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Secure Multiparty Computation (SMC) advanced from a theoretical technique to a practically applicable cryptographic technology. Several frameworks were proposed of which some are still actively developed. We perform a first comprehensive study of performance characteristics of SMC protocols using a promising implementation based on secret sharing, a common and state-of-the-art foundation. We analyze its scalability with respect to environmental parameters as the number of peers and network properties - namely transmission rate, packet loss, network latency - as parameters and execution time, CPU cycles, memory consumption and amount of transmitted data as variables. Our insights on the resource consumption show that such a solution is practically applicable in intranet environments and - with limitations - in Internet settings.
引用
收藏
页码:355 / 372
页数:18
相关论文
共 50 条
  • [31] Secure Aggregation Protocol Based on DC-Nets and Secret Sharing for Decentralized Federated Learning
    Pereira, Diogo
    Reis, Paulo Ricardo
    Borges, Fabio
    SENSORS, 2024, 24 (04)
  • [32] A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases
    Rahmani, Peyman
    Taheri, Mohammad
    Fakhrahmad, Seyed Mostafa
    IET COMMUNICATIONS, 2023, 17 (07) : 775 - 789
  • [33] Secure multi-party computation with secret sharing for real-time data aggregation in IIoT
    Liu, Dengzhi
    Yu, Geng
    Zhong, Zhaoman
    Song, Yuanzhao
    COMPUTER COMMUNICATIONS, 2024, 224 : 159 - 168
  • [34] Network-Efficient Pipelining-Based Secure Multiparty Computation for Machine Learning Applications
    Bautista, Oscar G.
    Akkaya, Kemal
    PROCEEDINGS OF THE 2022 47TH IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2022), 2022, : 205 - 213
  • [35] MDTL: Maliciously Secure Distributed Transfer Learning Based on Replicated Secret Sharing
    Tian, Zhengran
    Wang, Hao
    Li, Zhi
    Niu, Ziyu
    Wei, Xiaochao
    Su, Ye
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2025, 22 (01): : 877 - 891
  • [36] SECURE MULTIPATH ROUTING BASED ON SECRET SHARING IN MOBILE AD HOC NETWORKS
    Chen, Siguang
    Wu, Meng
    2009 IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT, PROCEEDINGS, 2009, : 539 - 542
  • [37] A Secret-Sharing Based Privacy-Preserving Distributed Energy Resource Control Framework
    Huo, Xiang
    Liu, Mingxi
    2022 IEEE 31ST INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2022, : 963 - 966
  • [38] An Efficient Multiparty Quantum Secret Sharing Protocol Based on Bell States in the High Dimension Hilbert Space
    Gao, Gan
    Wang, Li-ping
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2010, 49 (11) : 2852 - 2858
  • [39] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme
    Tang, Zhaohui
    IEEE ACCESS, 2021, 9 : 76908 - 76920
  • [40] Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach
    Bansal, Gaurang
    Sikdar, Biplab
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (04): : 3598 - 3610