Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation

09/21/2022
by   Alessandro Baccarini, et al.
0

Secure multi-party computation have seen substantial performance improvements in recent years and are being increasingly used in commercial products. While a great deal of work was dedicated to improving their efficiency under standard security models, the threat models do not take into account information leakage from the output of secure function evaluation. Quantification of information disclosure about private inputs from observing the function outcome is the subject of this work. Motivated by the City of Boston gender pay gap studies, we focus on the computation of average salaries and determine information disclosure about a target's private input to an adversary for a number of distributions including log-normal, which is typically used for modeling salaries. We consequently evaluate information disclosure after a repeated evaluation of the function on overlapping inputs and provide recommendations for using the sum and average functions in secure computation applications in practice.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/01/2018

Optimal Accuracy-Privacy Trade-Off for Secure Multi-Party Computations

The purpose of Secure Multi-Party Computation is to enable protocol part...
research
05/11/2020

Secure Computation to Hide Functions of Inputs

We consider a two-user secure computation problem in which Alice and Bob...
research
01/03/2019

Scalable Information-Flow Analysis of Secure Three-Party Affine Computations

Elaborate protocols in Secure Multi-party Computation enable several par...
research
06/09/2023

McFIL: Model Counting Functionality-Inherent Leakage

Protecting the confidentiality of private data and using it for useful c...
research
01/28/2022

Function Computation Without Secure Links: Information and Leakage Rates

Consider L users, who each holds private data, and one fusion center who...
research
04/19/2023

Weakly Secure Summation with Colluding Users

In secure summation, K users, each holds an input, wish to compute the s...
research
06/01/2023

A Formal Model for Secure Multiparty Computation

Although Secure Multiparty Computation (SMC) has seen considerable devel...

Please sign up or login with your details

Forgot password? Click here to reset