Secure Computing Protocols without Revealing the Inputs to Each of the Various Participants

Authors

  • Shefer Roper Samuel Neaman Institute for Advanced Studies in Science and Technology Technion, Technion City, Haifa 32000, Israel
  • Plessner Bar Samuel Neaman Institute for Advanced Studies in Science and Technology Technion, Technion City, Haifa 32000, Israel

Keywords:

Cryptography; Homomorphic Encryption; Multi-Party Computation (MPC); Privacy; Secure Protocols

Abstract

This work focuses on analyzing cryptographic protocols through which two or more parties can compute functions of their joint inputs without divulging their inputs in their raw form which is a building block of SMPC. Due to the security one gets to protect the data in the computations SMPC allows participants to engage in the computations while protecting the data it is used in fields such as finance, healthcare and data analytics whereby data is sensitive. The subject of the study is approaches for introducing security into the examined protocols to guarantee their correctness while preserving user privacy, through the use of such tools as homomorphic encryption, secret sharing, and zero-knowledge technology. We consider various security configurations, such as semi-honest and
malicious security, to understand how vulnerable these protocols are to feasible attacks or data exposure. Also, important issues, such as scaling and computational complexity, are discussed where we give solutions for minimizing communication cost and time in the context of big data applications. The outcome indicates that carrying out secure and practical SMPC with strong security assurances is feasible, irrespective of performance requirements of various actual-world application scenarios. This work is relevant to the current state of the art in cryptography and provides new protocols enabling sensitive computations for real privacy-preserving applications in the modern digital environment.

Downloads

Published

2024-09-22

How to Cite

Shefer Roper, & Plessner Bar. (2024). Secure Computing Protocols without Revealing the Inputs to Each of the Various Participants. International Journal of Communication and Computer Technologies, 12(2), 31–39. Retrieved from https://ijccts.org/index.php/pub/article/view/234

Issue

Section

Research Article