Scalable Information-Flow Analysis of Secure Three-Party Affine Computations

01/03/2019
by   Patrick Ah-Fat, et al.
0

Elaborate protocols in Secure Multi-party Computation enable several participants to compute a public function of their own private inputs while ensuring that no undesired information leaks about the private inputs, and without resorting to any trusted third party. However, the public output of the computation inevitably leaks some information about the private inputs. Recent works have introduced a framework and proposed some techniques for quantifying such information flow. Yet, owing to their complexity, those methods do not scale to practical situations that may involve large input spaces. The main contribution of the work reported here is to formally investigate the information flow captured by the min-entropy in the particular case of secure three-party computations of affine functions in order to make its quantification scalable to realistic scenarios. To this end, we mathematically derive an explicit formula for this entropy under uniform prior beliefs about the inputs. We show that this closed-form expression can be computed in time constant in the inputs sizes and logarithmic in the coefficients of the affine function. Finally, we formulate some theoretical bounds for this privacy leak in the presence of non-uniform prior beliefs.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/01/2018

Optimal Accuracy-Privacy Trade-Off for Secure Multi-Party Computations

The purpose of Secure Multi-Party Computation is to enable protocol part...
research
09/20/2020

Two and Three-Party Digital Goods Auctions: Scalable Privacy Analysis

A digital goods auction is a type of auction where potential buyers bid ...
research
05/11/2020

Secure Computation to Hide Functions of Inputs

We consider a two-user secure computation problem in which Alice and Bob...
research
09/21/2022

Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation

Secure multi-party computation have seen substantial performance improve...
research
04/05/2020

FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning

This paper aims to enable training and inference of neural networks in a...
research
02/07/2022

Scalable Multi-Party Privacy-Preserving Gradient Tree Boosting over Vertically Partitioned Dataset with Outsourced Computations

Due to privacy concerns, multi-party gradient tree boosting algorithms h...

Please sign up or login with your details

Forgot password? Click here to reset