Optimal Accuracy-Privacy Trade-Off for Secure Multi-Party Computations

03/01/2018
by   Patrick Ah-Fat, et al.
0

The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public function of their private inputs while keeping their inputs secret, without resorting to any trusted third party. However, opening the public output of such computations inevitably reveals some information about the private inputs. We propose a measure generalising both Renyi entropy and g-entropy so as to quantify this information leakage. In order to control and restrain such information flows, we introduce the notion of function substitution which replaces the computation of a function that reveals sensitive information with that of an approximate function. We exhibit theoretical bounds for the privacy gains that this approach provides and experimentally show that this enhances the confidentiality of the inputs while controlling the distortion of computed output values. Finally, we investigate the inherent compromise between accuracy of computation and privacy of inputs and we demonstrate how to realise such optimal trade-offs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/03/2019

Scalable Information-Flow Analysis of Secure Three-Party Affine Computations

Elaborate protocols in Secure Multi-party Computation enable several par...
research
09/21/2022

Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation

Secure multi-party computation have seen substantial performance improve...
research
09/20/2020

Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis

A digital goods auction is a type of auction where potential buyers bid ...
research
09/20/2019

Output-sensitive Information flow analysis

Constant-time programming is a countermeasure to prevent cache based att...
research
06/09/2023

McFIL: Model Counting Functionality-Inherent Leakage

Protecting the confidentiality of private data and using it for useful c...
research
03/01/2021

Multi-Party Proof Generation in QAP-based zk-SNARKs

Zero-knowledge succinct non-interactive argument of knowledge (zkSNARK) ...
research
09/07/2018

Cloud-based Quadratic Optimization with Partially Homomorphic Encryption

The development of large-scale distributed control systems has led to th...

Please sign up or login with your details

Forgot password? Click here to reset