Protocols for Secure Multi-party Computation: Design, Implementation and Performance Evaluation

Free registration required

Executive Summary

Protocols for secure multi-party computation allow participants to share a computation while each party learns only what can be inferred from their own inputs and the output of the computation. However, the execution time of a secure protocol may be too high so that it is not practical unless some tradeoffs being made between data access and confidentiality. In this technical paper, the authors propose a set of information theoretically secure protocols based on scalar product protocol and aim to provide some empirical basis for making such tradeoffs in computing exponentiation. A detailed performance evaluation was carried out by taking advantage of the compositional nature of their protocols.

  • Format: PDF
  • Size: 835.1 KB