TU Darmstadt / ULB / TUbiblio

Automatic Protocol Selection in Secure Two-Party Computations

Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel (2013)
Automatic Protocol Selection in Secure Two-Party Computations.
20th Network and Distributed System Security Symposium (NDSS'13). San Diego, USA (24.02.2013-27.02.2013)
Conference or Workshop Item, Bibliographie

Abstract

Performance of secure computation is still often an obstacle to its practical adoption. There are different protocols for secure computation that compete for the best performance. In this paper we propose automatic protocol selection which selects a protocol for each operation resulting in a mix with the best performance so far. Based on an elaborate performance model, we propose an optimization algorithm and an efficient heuristic for this selection problem. We show that our mixed protocols achieve the best performance on a set of use cases. Furthermore, our results underpin that the selection problem is so complicated, that a programmer is unlikely to manually make the optimal selection. Our proposed algorithms nevertheless can be integrated into a compiler in order to yield the best (ornear-optimal) performance.

Item Type: Conference or Workshop Item
Erschienen: 2013
Creators: Kerschbaum, Florian ; Schneider, Thomas ; Schröpfer, Axel
Type of entry: Bibliographie
Title: Automatic Protocol Selection in Secure Two-Party Computations
Language: English
Date: 23 April 2013
Event Title: 20th Network and Distributed System Security Symposium (NDSS'13)
Event Location: San Diego, USA
Event Dates: 24.02.2013-27.02.2013
Corresponding Links:
Abstract:

Performance of secure computation is still often an obstacle to its practical adoption. There are different protocols for secure computation that compete for the best performance. In this paper we propose automatic protocol selection which selects a protocol for each operation resulting in a mix with the best performance so far. Based on an elaborate performance model, we propose an optimization algorithm and an efficient heuristic for this selection problem. We show that our mixed protocols achieve the best performance on a set of use cases. Furthermore, our results underpin that the selection problem is so complicated, that a programmer is unlikely to manually make the optimal selection. Our proposed algorithms nevertheless can be integrated into a compiler in order to yield the best (ornear-optimal) performance.

Uncontrolled Keywords: Secure Protocols, Secure Data
Additional Information:

TUD-CS-2013-0360

Divisions: 20 Department of Computer Science
20 Department of Computer Science > Kryptographische Protokolle
Profile Areas
Profile Areas > Cybersecurity (CYSEC)
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
20 Department of Computer Science > EC SPRIDE
20 Department of Computer Science > EC SPRIDE > Engineering Cryptographic Protocols (am 01.03.2018 in Cryptography and Privacy Engineering)
Date Deposited: 05 Oct 2016 19:42
Last Modified: 06 Aug 2024 08:20
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)
Show editorial Details Show editorial Details