A practical approach to solve Secure Multi-party Computation problems
- 23 September 2002
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 127-135
- https://doi.org/10.1145/844102.844125
Abstract
Secure Multi-party Computation (SMC) problems deal with the following situation: Two (or many) parties want to jointly perform a computation. Each party needs to contribute its private input to this computation, but no party should disclose its private inputs to the other parties, or to any third party. With the proliferation of the Internet, SMC problems becomes more and more important. So far no practical solution has emerged, largely because SMC studies have been focusing on zero information disclosure, an ideal security model that is expensive to achieve.Aiming at developing practical solutions to SMC problems, we propose a new paradigm, in which we use an acceptable security model that allows partial information disclosure. Our conjecture is that by lowering the restriction on the security, we can achieve a much better performance. The paradigm is motivated by the observation that in practice people do accept a less secure but much more efficient solution because sometimes disclosing information about their private data to certain degree is a risk that many people would rather take if the performance gain is so significant. Moreover, in our paradigm, the security is adjustable, such that users can adjust the level of security based on their definition of the acceptable security. We have developed a number of techniques under this new paradigm, and are currently conducting extensive studies based on this new paradigm.Keywords
This publication has 12 references indexed in Scilit:
- Selective private function evaluation with applications to private statisticsPublished by Association for Computing Machinery (ACM) ,2001
- Privacy-preserving data miningPublished by Association for Computing Machinery (ACM) ,2000
- Oblivious transfer and polynomial evaluationPublished by Association for Computing Machinery (ACM) ,1999
- Improved upper bounds on information-theoretic private information retrieval (extended abstract)Published by Association for Computing Machinery (ACM) ,1999
- Protecting data privacy in private information retrieval schemesPublished by Association for Computing Machinery (ACM) ,1998
- Universal service-providers for database private information retrieval (extended abstract)Published by Association for Computing Machinery (ACM) ,1998
- Server-assisted cryptographyPublished by Association for Computing Machinery (ACM) ,1998
- Commodity-based cryptography (extended abstract)Published by Association for Computing Machinery (ACM) ,1997
- Computationally private information retrieval (extended abstract)Published by Association for Computing Machinery (ACM) ,1997
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987