Advertisement

Privacy Preserving Computation in Home Loans Using the FRESCO Framework

  • Fook Mun ChanEmail author
  • Quanqing Xu
  • Hao Jian Seah
  • Sye Loong Keoh
  • Zhaohui Tang
  • Khin Mi Mi Aung
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 887)

Abstract

Secure Multiparty Computation (SMC) is a subfield of cryptography that allows multiple parties to compute jointly on a function without revealing their inputs to others. The technology is able to solve potential privacy issues that arises when a trusted third party is involved, like a server. This paper aims to evaluate implementations of Secure Multiparty Computation and its viability for practical use. The paper also seeks to understand and state the challenges and concepts of Secure Multiparty Computation through the construction of a home loan calculation application. Encryption over Multi Party Computation (MPC) is done within 2 to 2.5 s. Up to 10 K addition operations, MPC system performs very well and most applications will be sufficient within 10K additions.

Keywords

Privacy Secure multiparty computation FRamework for Efficient Secure COmputation (FRESCO) 

References

  1. 1.
    Katal, A., Wazid, M., Goudar, R.: Big data: issues, challenges, tools and good practices. In: 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 404–409. IEEE (2013)Google Scholar
  2. 2.
    Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: ACM Sigmod Record, vol. 29, no. 2, pp. 439–450. ACM (2000)Google Scholar
  3. 3.
    Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science SFCS 2008, pp. 160–164. IEEE (1982)Google Scholar
  4. 4.
    Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637–647 (1985)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, pp. 245–254. ACM (1999)Google Scholar
  6. 6.
    Savage, J.E.: Models of Computation. Addison-Wesley, Reading, vol. 136 (1998)Google Scholar
  7. 7.
    Gentry, C., et al.: Fully homomorphic encryption using ideal lattices. In: STOC, vol. 9, no. 2009, pp. 169–178 (2009)Google Scholar
  8. 8.
    Yao, A.C.-C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, pp. 162–167. IEEE (1986)Google Scholar
  9. 9.
    Lindell, Y., Pinkas, B.: A proof of security of yaos protocol for two-party computation (2006)Google Scholar
  10. 10.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Liu, C.L.: Introduction to Combinatorial Mathematics (1968)Google Scholar
  12. 12.
    Beimel, A.: Secret-sharing schemes: a survey. In: International Conference on Coding and Cryptology, pp. 11–46. Springer (2011)Google Scholar
  13. 13.
    Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: European Symposium on Research in Computer Security, pp. 192–206. Springer (2008)Google Scholar
  14. 14.
    Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 1–10. ACM (1988)Google Scholar
  15. 15.
    Asharov, G., Lindell, Y.: A full proof of the BGW protocol for perfectly secure multiparty computation. J. Cryptol. 30(1), 58–151 (2017)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Advances in Cryptology-CRYPTO 2012, pp. 643–662. Springer (2012)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Fook Mun Chan
    • 1
    Email author
  • Quanqing Xu
    • 1
  • Hao Jian Seah
    • 2
  • Sye Loong Keoh
    • 2
  • Zhaohui Tang
    • 3
  • Khin Mi Mi Aung
    • 1
  1. 1.Data Storage Institute, A*STARSingaporeSingapore
  2. 2.University of GlasgowGlasgowUK
  3. 3.Singapore Institute of TechnologySingaporeSingapore

Personalised recommendations