A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation

被引:5
|
作者
von Maltitz, Marcel [1 ]
Carle, Georg [1 ]
机构
[1] Tech Univ Munich, Dept Informat, Chair Network Architectures & Serv, Munich, Germany
关键词
Cryptography; Secure Multiparty Computation; Privacy; Performance; Resource consumption; Measurement; PRIVACY;
D O I
10.1007/978-3-030-00305-0_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Secure Multiparty Computation (SMC) advanced from a theoretical technique to a practically applicable cryptographic technology. Several frameworks were proposed of which some are still actively developed. We perform a first comprehensive study of performance characteristics of SMC protocols using a promising implementation based on secret sharing, a common and state-of-the-art foundation. We analyze its scalability with respect to environmental parameters as the number of peers and network properties - namely transmission rate, packet loss, network latency - as parameters and execution time, CPU cycles, memory consumption and amount of transmitted data as variables. Our insights on the resource consumption show that such a solution is practically applicable in intranet environments and - with limitations - in Internet settings.
引用
收藏
页码:355 / 372
页数:18
相关论文
共 50 条
  • [41] Multiparty secret sharing of quantum information based on entanglement swapping
    Li, YM
    Zhang, KS
    Peng, KC
    PHYSICS LETTERS A, 2004, 324 (5-6) : 420 - 424
  • [42] Multiparty semiquantum secret sharing based on rearranging orders of qubits
    Gao, Gan
    Wang, Yue
    Wang, Dong
    MODERN PHYSICS LETTERS B, 2016, 30 (10):
  • [43] Share conversion, pseudorandom secret-sharing and applications to secure computation
    Cramer, R
    Damgård, I
    Ishai, Y
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 342 - 362
  • [44] Secure Computation by Secret Sharing using Input Encrypted with Random Number
    Iwamura, Keiichi
    Kamal, Ahmad Akmal Aminuddin Mohd
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 540 - 547
  • [45] High Efficiency Secure Channels for a Secure Multiparty Computation Protocol Based on Signal
    Yang Y.
    Zhang R.
    Security and Communication Networks, 2023, 2023
  • [46] A practical implementation of secure auctions based on multiparty integer computation
    Bogetoft, Peter
    Damgard, Ivan
    Jakobsen, Thomas
    Nielsen, Kurt
    Pagter, Jakob
    Toft, Tomas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2006, 4107 : 142 - 147
  • [47] Consideration of the XOR-operation based Secure Multiparty Computation
    Suga, Yuji
    2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 506 - 510
  • [48] Secure multiparty quantum computation based on Lagrange unitary operator
    Xiuli Song
    Rui Gou
    Aijun Wen
    Scientific Reports, 10
  • [49] Blockchain-Based Secure and Efficient Secret Image Sharing With Outsourcing Computation in Wireless Networks
    Zhou, Zhili
    Wan, Yao
    Cui, Qi
    Yu, Keping
    Mumtaz, Shahid
    Yang, Ching-Nung
    Guizani, Mohsen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (01) : 423 - 435
  • [50] Secure Social Recommendation Based on Secret Sharing
    Chen, Chaochao
    Li, Liang
    Wu, Bingzhe
    Hong, Cheng
    Wang, Li
    Zhou, Jun
    ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 : 506 - 512