Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security 2015
DOI: 10.1145/2810103.2813664
|View full text |Cite
|
Sign up to set email alerts
|

A Domain-Specific Language for Low-Level Secure Multiparty Computation Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…The characteristic vector of an element is a vector , where b x =1 and all other elements are equal to 0. The shared3p protocol set has a simple and efficient protocol for computing characteristic vectors, described in [ 27 ]. The protocol turns a private value into a private characteristic vector.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The characteristic vector of an element is a vector , where b x =1 and all other elements are equal to 0. The shared3p protocol set has a simple and efficient protocol for computing characteristic vectors, described in [ 27 ]. The protocol turns a private value into a private characteristic vector.…”
Section: Methodsmentioning
confidence: 99%
“…In our implementation, ⟦ z ′ ⟧ is shared over , hence taking the first 16 bits of it is a local operation, resulting in a value in . The characteristic vector protocol in [ 27 ] is easily adaptable to compute the characteristic vectors of elements of , and its result is a vector over with length 2 B . The computation of the characteristic vector requires communication of two elements of and one element of (in total , not per party).…”
Section: Methodsmentioning
confidence: 99%
“…This set covers integer, fix-and floating point operations, as well as shuffling the arrays. Almost all these protocols are generated from a clear description of how messages are computed and exchanged between parties [43], which is very similar to the circuits C ij defined in Sec. 3.…”
Section: Methodsmentioning
confidence: 99%
“…Still, in this paper it only serves to syntactically restrict programs to a form-secret variables are only directly assigned to secret variables, or used as input to sop or declassify operations-compatible with our distributed semantic evaluation rules, where public values can be transparently used as secret ones, but the contrary is not true. 5 b) Leakage analysis: A security type system can serve as a preliminary security analysis. Indeed, if declassify statements are not used (the program has no leakage), it can enforce source-level security for all leakage relations that guarantee equality of public inputs, but says little about security in the presence of leakage.…”
Section: Source-level Security Verificationmentioning
confidence: 99%