Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks

dc.contributor.author Hugo Pereira Pacheco en
dc.contributor.author Bernardo Luís Portela en
dc.contributor.author Vítor Parreira Pereira en
dc.contributor.author José Bacelar Almeida en
dc.contributor.author Manuel Barbosa en
dc.contributor.author Barthe,G en
dc.contributor.other 5647 en
dc.contributor.other 5604 en
dc.contributor.other 5598 en
dc.contributor.other 6374 en
dc.contributor.other 6060 en
dc.date.accessioned 2019-12-12T21:38:55Z
dc.date.available 2019-12-12T21:38:55Z
dc.date.issued 2018 en
dc.description.abstract We give a language-based security treatment of domain-specific languages and compilers for secure multi-party computation, a cryptographic paradigm that enables collaborative computation over encrypted data. Computations are specified in a core imperative language, as if they were intended to be executed by a trusted-third party, and formally verified against an information-flow policy modelling (an upper bound to) their leakage. This allows non-experts to assess the impact of performance-driven authorized disclosure of intermediate values. Specifications are then compiled to multi-party protocols. We formalize protocol security using (distributed) probabilistic information-flow and prove security-preserving compilation: Protocols only leak what is allowed by the source policy. The proof exploits a natural but previously missing correspondence between simulation-based cryptographic proofs and (composable) probabilistic non-interference. Finally, we extend our framework to justify leakage cancelling, a domain-specific optimization that allows to first write an efficient specification that fails to meet the allowed leakage upper-bound, and then apply a probabilistic pre-processing that brings leakage to the acceptable range. © 2018 IEEE. en
dc.identifier.uri http://repositorio.inesctec.pt/handle/123456789/10500
dc.identifier.uri http://dx.doi.org/10.1109/csf.2018.00017 en
dc.language eng en
dc.rights info:eu-repo/semantics/openAccess en
dc.title Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks en
dc.type conferenceObject en
dc.type Publication en
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
P-00P-HTH.pdf
Size:
629.63 KB
Format:
Adobe Portable Document Format
Description: