2016 IEEE Cybersecurity Development (SecDev) 2016
DOI: 10.1109/secdev.2016.027
|View full text |Cite
|
Sign up to set email alerts
|

Secure MPC for Analytics as a Web Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 7 publications
0
11
0
1
Order By: Relevance
“…This area was kicked off in the 1980's by Yao [493]. Thanks to both theoretical and engineering breakthroughs, the field has moved from being of a purely theoretical interest to a deployed technology in industry [78,77,295,27,191,242,243]. It is important to remark that MPC defines a set of technologies, and should be regarded more as a field, or a general notion of security in secure computation, than a technology per se.…”
Section: Secure Computationsmentioning
confidence: 99%
“…This area was kicked off in the 1980's by Yao [493]. Thanks to both theoretical and engineering breakthroughs, the field has moved from being of a purely theoretical interest to a deployed technology in industry [78,77,295,27,191,242,243]. It is important to remark that MPC defines a set of technologies, and should be regarded more as a field, or a general notion of security in secure computation, than a technology per se.…”
Section: Secure Computationsmentioning
confidence: 99%
“…It also reduces the communication and computation cost compared to the centralized system. In order to ensure the privacy of aggregated data, Lapets et al [106] suggested the use of MPC protocol over the web environment. Depending upon MPC protocol, aggregate data will be computed, while the confidentiality of the contributor's credentials is protected simultaneously.…”
Section: B Secure Multi-party Computationmentioning
confidence: 99%
“…Web-MPC [35] leverages a variant [22] of standard additive secret sharing [10] to enable data analyses that do not require data contributors to reveal their data. This protocol allows a large number parties with limited computational resources to aggregate their data with the help of at least one party that can operate a web server.…”
Section: Web-mpc Data Aggregation Frameworkmentioning
confidence: 99%
“…The comprehensibility of the additive secret sharing protocol used by Web-MPC played a critical role in our and BWWC's ability to explain to non-technical participants that each company could contribute cumulative employee earnings to the city-wide analysis, that our institution could provide and manage the computational resources and MPC data analysis application, and that only aggregate data would be revealed by the output. Prior work discusses our experiences communicating with participating organizations about the protocol's capabilities [5,22]. Ultimately, the BWWC was able to analyze aggregate data across companies while keeping company-specific data private during three successful deployments in 2015, 2016, and 2017.…”
Section: Applications 41 100% Talent Compactmentioning
confidence: 99%