A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation

被引:5
作者
von Maltitz, Marcel [1 ]
Carle, Georg [1 ]
机构
[1] Tech Univ Munich, Dept Informat, Chair Network Architectures & Serv, Munich, Germany
来源
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY | 2018年 / 11025卷
关键词
Cryptography; Secure Multiparty Computation; Privacy; Performance; Resource consumption; Measurement; PRIVACY;
D O I
10.1007/978-3-030-00305-0_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Secure Multiparty Computation (SMC) advanced from a theoretical technique to a practically applicable cryptographic technology. Several frameworks were proposed of which some are still actively developed. We perform a first comprehensive study of performance characteristics of SMC protocols using a promising implementation based on secret sharing, a common and state-of-the-art foundation. We analyze its scalability with respect to environmental parameters as the number of peers and network properties - namely transmission rate, packet loss, network latency - as parameters and execution time, CPU cycles, memory consumption and amount of transmitted data as variables. Our insights on the resource consumption show that such a solution is practically applicable in intranet environments and - with limitations - in Internet settings.
引用
收藏
页码:355 / 372
页数:18
相关论文
共 50 条
  • [41] Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
    Luo, Yun
    Chen, Yuling
    Li, Tao
    Tan, Chaoyue
    Dou, Hui
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [42] Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
    Yun Luo
    Yuling Chen
    Tao Li
    Chaoyue Tan
    Hui Dou
    Journal of Cloud Computing, 13
  • [43] MPCDDI: A Secure Multiparty Computation-Based Deep Learning Framework for Drug-Drug Interaction Predictions
    Xiao, Xia
    Wang, Xiaoqi
    Liu, Shengyun
    Peng, Shaoliang
    BIOINFORMATICS RESEARCH AND APPLICATIONS, ISBRA 2022, 2022, 13760 : 263 - 274
  • [44] AN EFFICIENT AND INFORMATION THEORETICALLY SECURE RATIONAL SECRET SHARING SCHEME BASED ON SYMMETRIC BIVARIATE POLYNOMIALS
    Tartary, Christophe
    Wang, Huaxiong
    Zhang, Yun
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1395 - 1416
  • [45] A secure visual secret sharing (VSS) scheme with CNN-based image enhancement for underwater images
    Mhala, Nikhil C.
    Pais, Alwyn R.
    VISUAL COMPUTER, 2021, 37 (08) : 2097 - 2111
  • [46] Limited Resource Semi-Quantum Secret Sharing Based on Multi-Level Systems
    Xiang, Yi
    Liu, Jun
    Bai, Ming-qiang
    Yang, Xue
    Mo, Zhi-wen
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (09) : 2883 - 2892
  • [47] Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm
    Kumar, Pradeep
    Banerjee, Kakoli
    Singhal, Niraj
    Kumar, Ajay
    Rani, Sita
    Kumar, Raman
    Cioca, Adriana Lavinia
    SENSORS, 2022, 22 (22)
  • [48] Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
    Mashhadi, Samaneh
    Dehkordi, Massoud Hadian
    Kiamari, Niloofar
    IET INFORMATION SECURITY, 2017, 11 (06) : 326 - 331
  • [49] Limited Resource Semi-Quantum Secret Sharing Based on Multi-Level Systems
    Yi Xiang
    Jun Liu
    Ming-qiang Bai
    Xue Yang
    Zhi-wen Mo
    International Journal of Theoretical Physics, 2019, 58 : 2883 - 2892
  • [50] Secure CPS Content-Based Image Retrieval Using Tripartite Delayed Homomorphic Secret Sharing & CNN
    Yu, Haoyang
    Zhang, Jiwei
    Feng, Huamin
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2024, 14