Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3319535.3339818acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing

Published: 06 November 2019 Publication History

Abstract

Multi-party computation (MPC) protocols have been extensively optimized in an effort to bring this technology to practice, which has already started bearing fruits. The choice of which MPC protocol to use depends on the computation we are trying to perform. Protocol mixing is an effective black-box ---with respect to the MPC protocols---approach to optimize performance. Despite, however, considerable progress in the recent years existing works are heuristic and either give no guarantee or require an exponential (brute-force) search to find the optimal assignment, a problem which was conjectured to be NP hard.
We provide a theoretically founded approach to optimal (MPC) protocol assignment, i.e., optimal mixing, and prove that under mild and natural assumptions, the problem is tractable both in theory and in practice for computing best two-out-of-three combinations. Concretely, for the case of two protocols, we utilize program analysis techniques---which we tailor to MPC---to define a new integer program, which we term the Optimal Protocol Assignment (in short, OPA) problem whose solution is the optimal (mixed) protocol assignment for these two protocols. Most importantly, we prove that the solution to the linear program corresponding to the relaxation of OPA is integral, and hence is also a solution to OPA. Since linear programming can be efficiently solved, this yields the first efficient protocol mixer. We showcase the quality of our OPA solver by applying it to standard benchmarks from the mixing literature. Our OPA solver can be applied on any two-out-of-three protocol combinations to obtain a best two-out-of-three protocol assignment.

Supplementary Material

WEBM File (p1539-ishaq.webm)

References

[1]
% $ biblatex auxiliary file $ % $ biblatex bbl format version 2.9 $ % Do not modify the above lines! % % This is an auxiliary file used by the 'biblatex' package. % This file may safely be deleted. It will be recreated by % biber as required. %
[2]
begingroup
[3]
makeatletter
[5]
@latex@error {Missing 'biblatex' package} {The bibliography requires the 'biblatex' package.}
[6]
aftergroup
[7]
endinput} {}
[8]
[9]
refsection{0}
[10]
datalist[entry]{nty/global//global/global}
[11]
entry{C:Beaver91b}{inproceedings}{}
[12]
name{author}{1}{}{% {{hash=8293acfe90aa8eaf9b54bb2d780b215f}{% family={Beaver}, familyi={B
[13]
bibinitperiod}, given={Donald}, giveni={D
[14]
bibinitperiod}}}% }
[15]
name{editor}{1}{}{% {{hash=287fefd25f3e4df488c1518e70fa1bd5}{% family={Feigenbaum}, familyi={F
[16]
bibinitperiod}, given={Joan}, giveni={J
[17]
bibinitperiod}}}% }
[18]
list{location}{1}{% {Santa Barbara, CA, USA}% }
[19]
list{publisher}{1}{% {Springer, Heidelberg, Germany}% }
[20]
strng{namehash}{8293acfe90aa8eaf9b54bb2d780b215f}
[21]
strng{fullhash}{8293acfe90aa8eaf9b54bb2d780b215f}
[22]
strng{bibnamehash}{8293acfe90aa8eaf9b54bb2d780b215f}
[23]
strng{authorbibnamehash}{8293acfe90aa8eaf9b54bb2d780b215f}
[24]
strng{authornamehash}{8293acfe90aa8eaf9b54bb2d780b215f}
[25]
strng{authorfullhash}{8293acfe90aa8eaf9b54bb2d780b215f}
[26]
strng{editorbibnamehash}{287fefd25f3e4df488c1518e70fa1bd5}
[27]
strng{editornamehash}{287fefd25f3e4df488c1518e70fa1bd5}
[28]
strng{editorfullhash}{287fefd25f3e4df488c1518e70fa1bd5}
[29]
field{sortinit}{B}
[30]
field{sortinithash}{276475738cc058478c1677046f857703}
[31]
field{labelnamesource}{author}
[32]
field{labeltitlesource}{title}
[33]
field{booktitle}{CRYPTO'91}
[34]
field{month}{8 11--15,}
[35]
field{series}{{LNCS}}
[36]
field{title}{Efficient Multiparty Protocols Using Circuit Randomization}
[37]
field{volume}{576}
[38]
field{year}{1992}
[39]
field{pages}{420
[40]
bibrangedash 432}
[41]
range{pages}{13}
[42]
[43]
verb 10.1007/3--540--46766--1_34
[44]
[45]
[46]
entry{fairplaymp:2008}{inproceedings}{}
[47]
name{author}{3}{}{% {{hash=6e5dff22ff694a9517c3266239970cb1}{% family={Ben-David}, familyi={B
[48]
bibinithyphendelim D
[49]
bibinitperiod}, given={A.}, giveni={A
[50]
bibinitperiod}}}% {{hash=c5cfedccd72890ddb5fb5f31b6ac3730}{% family={Nisan}, familyi={N
[51]
bibinitperiod}, given={N.}, giveni={N
[52]
bibinitperiod}}}% {{hash=b4b1a02d9e2d65cac6ae4360459230db}{% family={Pinkas}, familyi={P
[53]
bibinitperiod}, given={B.}, giveni={B
[54]
bibinitperiod}}}% }
[55]
list{location}{1}{% {Alexandria, VA, USA}% }
[56]
list{publisher}{1}{% {ACM}% }
[57]
strng{namehash}{d8ecb89c258ed6e5cdebeff4886ac05d}
[58]
strng{fullhash}{d8ecb89c258ed6e5cdebeff4886ac05d}
[59]
strng{bibnamehash}{d8ecb89c258ed6e5cdebeff4886ac05d}
[60]
strng{authorbibnamehash}{d8ecb89c258ed6e5cdebeff4886ac05d}
[61]
strng{authornamehash}{d8ecb89c258ed6e5cdebeff4886ac05d}
[62]
strng{authorfullhash}{d8ecb89c258ed6e5cdebeff4886ac05d}
[63]
field{sortinit}{B}
[64]
field{sortinithash}{276475738cc058478c1677046f857703}
[65]
field{labelnamesource}{author}
[66]
field{labeltitlesource}{title}
[67]
field{booktitle}{Proc. 15th ACM Conf. Comput. and Commun. Security (CCS)}
[68]
field{title}{{FairplayMP}: a system for secure multi-party computation}
[69]
field{year}{2008}
[70]
field{pages}{257
[71]
bibrangedash 266}
[72]
range{pages}{10}
[73]
[74]
entry{STOC:BenGolWig88}{inproceedings}{}
[75]
name{author}{3}{}{% {{hash=41eb128ae71f8745a6089159ac4aaf4e}{% family={{Ben-Or}}, familyi={B
[76]
bibinitperiod}, given={Michael}, giveni={M
[77]
bibinitperiod}}}% {{hash=39e4a0690915f1d991133196a545b37b}{% family={Goldwasser}, familyi={G
[78]
bibinitperiod}, given={Shafi}, giveni={S
[79]
bibinitperiod}}}% {{hash=94bdc407739d530448ac88956c6c98a5}{% family={Wigderson}, familyi={W
[80]
bibinitperiod}, given={Avi}, giveni={A
[81]
bibinitperiod}}}% }
[82]
list{location}{1}{% {Chicago, IL, USA}% }
[83]
list{publisher}{1}{% {{ACM} Press}% }
[84]
strng{namehash}{bc8541956602af48fb2539a988498d4a}
[85]
strng{fullhash}{bc8541956602af48fb2539a988498d4a}
[86]
strng{bibnamehash}{bc8541956602af48fb2539a988498d4a}
[87]
strng{authorbibnamehash}{bc8541956602af48fb2539a988498d4a}
[88]
strng{authornamehash}{bc8541956602af48fb2539a988498d4a}
[89]
strng{authorfullhash}{bc8541956602af48fb2539a988498d4a}
[90]
field{sortinit}{B}
[91]
field{sortinithash}{276475738cc058478c1677046f857703}
[92]
field{labelnamesource}{author}
[93]
field{labeltitlesource}{title}
[94]
field{booktitle}{20th ACM STOC}
[95]
field{month}{5 2--4,}
[96]
field{title}{Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)}
[97]
field{year}{1988}
[98]
field{pages}{1
[99]
bibrangedash 10}
[100]
range{pages}{10}
[101]
[102]
verb 10.1145/62212.62213
[103]
[104]
[105]
entry{ESORICS:BogLauWil08}{inproceedings}{}
[106]
name{author}{3}{}{% {{hash=8c11b0342d93fa9d604c23a58a719a81}{% family={Bogdanov}, familyi={B
[107]
bibinitperiod}, given={Dan}, giveni={D
[108]
bibinitperiod}}}% {{hash=a5cc0ccb6002017fea607fa13e9f3533}{% family={Laur}, familyi={L
[109]
bibinitperiod}, given={Sven}, giveni={S
[110]
bibinitperiod}}}% {{hash=84c0ea6e2426a80d6f8ab982315010ff}{% family={Willemson}, familyi={W
[111]
bibinitperiod}, given={Jan}, giveni={J
[112]
bibinitperiod}}}% }
[113]
name{editor}{2}{}{% {{hash=f21aa520ad69374e7b6d40b5c0891da7}{% family={Jajodia}, familyi={J
[114]
bibinitperiod}, given={Sushil}, giveni={S
[115]
bibinitperiod}}}% {{hash=1cf26e794ccdfcb650bcdaf791afae6c}{% family={L{ó}pez}, familyi={L
[116]
bibinitperiod}, given={Javier}, giveni={J
[117]
bibinitperiod}}}% }
[118]
list{location}{1}{% {M{á}laga, Spain}% }
[119]
list{publisher}{1}{% {Springer, Heidelberg, Germany}% }
[120]
strng{namehash}{7d91546d580262606d2bfc79e55c877e}
[121]
strng{fullhash}{7d91546d580262606d2bfc79e55c877e}
[122]
strng{bibnamehash}{7d91546d580262606d2bfc79e55c877e}
[123]
strng{authorbibnamehash}{7d91546d580262606d2bfc79e55c877e}
[124]
strng{authornamehash}{7d91546d580262606d2bfc79e55c877e}
[125]
strng{authorfullhash}{7d91546d580262606d2bfc79e55c877e}
[126]
strng{editorbibnamehash}{7e17f0486debb9b6721a94ad3e72c8a3}
[127]
strng{editornamehash}{7e17f0486debb9b6721a94ad3e72c8a3}
[128]
strng{editorfullhash}{7e17f0486debb9b6721a94ad3e72c8a3}
[129]
field{sortinit}{B}
[130]
field{sortinithash}{276475738cc058478c1677046f857703}
[131]
field{labelnamesource}{author}
[132]
field{labeltitlesource}{title}
[133]
field{booktitle}{ESORICS 2008}
[134]
field{month}{10 6--8,}
[135]
field{series}{{LNCS}}
[136]
field{title}{Sharemind: A Framework for Fast Privacy-Preserving Computations}
[137]
field{volume}{5283}
[138]
field{year}{2008}
[139]
field{pages}{192
[140]
bibrangedash 206}
[141]
range{pages}{15}
[142]
[143]
verb 10.1007/978--3--540--88313--5_13
[144]
[145]
[146]
entry{CCS:BDKKS18}{inproceedings}{}
[147]
name{author}{5}{}{% {{hash=8ac64e285c5cc5a73e5d08b845118d38}{% family={B{ü}scher}, familyi={B
[148]
bibinitperiod}, given={Niklas}, giveni={N
[149]
bibinitperiod}}}% {{hash=376a47a3c15967cd4525ebff96201eb6}{% family={Demmler}, familyi={D
[150]
bibinitperiod}, given={Daniel}, giveni={D
[151]
bibinitperiod}}}% {{hash=b9e502f041dbf3b5d3c907a9d726cf59}{% family={Katzenbeisser}, familyi={K
[152]
bibinitperiod}, given={Stefan}, giveni={S
[153]
bibinitperiod}}}% {{hash=3c0a08a8f129ad98dd8cb9affc83b68b}{% family={Kretzmer}, familyi={K
[154]
bibinitperiod}, given={David}, giveni={D
[155]
bibinitperiod}}}% {{hash=5d62da517b335078f08436fbab3a5f69}{% family={Schneider}, familyi={S
[156]
bibinitperiod}, given={Thomas}, giveni={T
[157]
bibinitperiod}}}% }
[158]
name{editor}{4}{}{% {{hash=7226f8a80689b0493e0a25d067884b85}{% family={Lie}, familyi={L
[159]
bibinitperiod}, given={David}, giveni={D
[160]
bibinitperiod}}}% {{hash=943889e604aa536baa09d048d98c0a7f}{% family={Mannan}, familyi={M
[161]
bibinitperiod}, given={Mohammad}, giveni={M
[162]
bibinitperiod}}}% {{hash=4b96cad75f27ce1349d97e2aea69ac76}{% family={Backes}, familyi={B
[163]
bibinitperiod}, given={Michael}, giveni={M
[164]
bibinitperiod}}}% {{hash=3458cd1c70f73bfd22ae3e41ff50f362}{% family={Wang}, familyi={W
[165]
bibinitperiod}, given={XiaoFeng}, giveni={X
[166]
bibinitperiod}}}% }
[167]
list{location}{1}{% {Toronto, ON, Canada}% }
[168]
list{publisher}{1}{% {{ACM} Press}% }
[169]
strng{namehash}{29d989d5e5a6e4f9f65f4001b02f1d6d}
[170]
strng{fullhash}{29d989d5e5a6e4f9f65f4001b02f1d6d}
[171]
strng{bibnamehash}{29d989d5e5a6e4f9f65f4001b02f1d6d}
[172]
strng{authorbibnamehash}{29d989d5e5a6e4f9f65f4001b02f1d6d}
[173]
strng{authornamehash}{29d989d5e5a6e4f9f65f4001b02f1d6d}
[174]
strng{authorfullhash}{29d989d5e5a6e4f9f65f4001b02f1d6d}
[175]
strng{editorbibnamehash}{2b4fbc7599ee17f14f5bb633dbfb9cef}
[176]
strng{editornamehash}{2b4fbc7599ee17f14f5bb633dbfb9cef}
[177]
strng{editorfullhash}{2b4fbc7599ee17f14f5bb633dbfb9cef}
[178]
field{sortinit}{B}
[179]
field{sortinithash}{276475738cc058478c1677046f857703}
[180]
field{labelnamesource}{author}
[181]
field{labeltitlesource}{title}
[182]
field{booktitle}{ACM CCS 2018}
[183]
field{month}{10 15--19,}
[184]
field{title}{{HyCC}: Compilation of Hybrid Protocols for Practical Secure Computation}
[185]
field{year}{2018}
[186]
field{pages}{847
[187]
bibrangedash 861}
[188]
range{pages}{15}
[189]
[190]
verb 10.1145/3243734.3243786
[191]
[192]
[193]
entry{DBLP:conf/uss/Buscher015}{inproceedings}{}
[194]
name{author}{2}{}{% {{hash=8ac64e285c5cc5a73e5d08b845118d38}{% family={B{ü}scher}, familyi={B
[195]
bibinitperiod}, given={Niklas}, giveni={N
[196]
bibinitperiod}}}% {{hash=b9e502f041dbf3b5d3c907a9d726cf59}{% family={Katzenbeisser}, familyi={K
[197]
bibinitperiod}, given={Stefan}, giveni={S
[198]
bibinitperiod}}}% }
[199]
strng{namehash}{ad41b13078aa7a06255e05df473add6c}
[200]
strng{fullhash}{ad41b13078aa7a06255e05df473add6c}
[201]
strng{bibnamehash}{ad41b13078aa7a06255e05df473add6c}
[202]
strng{authorbibnamehash}{ad41b13078aa7a06255e05df473add6c}
[203]
strng{authornamehash}{ad41b13078aa7a06255e05df473add6c}
[204]
strng{authorfullhash}{ad41b13078aa7a06255e05df473add6c}
[205]
field{sortinit}{B}
[206]
field{sortinithash}{276475738cc058478c1677046f857703}
[207]
field{labelnamesource}{author}
[208]
field{labeltitlesource}{title}
[209]
field{booktitle}{24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12--14, 2015.}
[210]
field{title}{Faster Secure Computation through Automatic Parallelization}
[211]
field{year}{2015}
[212]
field{pages}{531
[213]
bibrangedash 546}
[214]
range{pages}{16}
[215]
verb{urlraw}
[216]
verb https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/buescher
[217]
[218]
[219]
verb https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/buescher
[220]
[221]
[222]
entry{Camion:1965}{article}{}
[223]
name{author}{1}{}{% {{hash=a85c46625f51378e653ebc179ef50cfb}{% family={Camion}, familyi={C
[224]
bibinitperiod}, given={Paul}, giveni={P
[225]
bibinitperiod}}}% }
[226]
strng{namehash}{a85c46625f51378e653ebc179ef50cfb}
[227]
strng{fullhash}{a85c46625f51378e653ebc179ef50cfb}
[228]
strng{bibnamehash}{a85c46625f51378e653ebc179ef50cfb}
[229]
strng{authorbibnamehash}{a85c46625f51378e653ebc179ef50cfb}
[230]
strng{authornamehash}{a85c46625f51378e653ebc179ef50cfb}
[231]
strng{authorfullhash}{a85c46625f51378e653ebc179ef50cfb}
[232]
field{sortinit}{C}
[233]
field{sortinithash}{963e9d84a3da2344e8833203de5aed05}
[234]
field{labelnamesource}{author}
[235]
field{labeltitlesource}{title}
[236]
field{journaltitle}{Proceedings of the American Mathematical Society}
[237]
field{number}{5}
[238]
field{title}{Characterization of Totally Unimodular Matrices}
[239]
field{volume}{16}
[240]
field{year}{1965}
[241]
field{pages}{1068
[242]
bibrangedash 1073}
[243]
range{pages}{6}
[244]
[245]
entry{DBLP:journals/iacr/ChandranGRST17}{article}{}
[246]
name{author}{5}{}{% {{hash=6baa3adc0814bc509941c43f7aba3275}{% family={Chandran}, familyi={C
[247]
bibinitperiod}, given={Nishanth}, giveni={N
[248]
bibinitperiod}}}% {{hash=37780415c576c7e7edeac8a4a8c408cc}{% family={Gupta}, familyi={G
[249]
bibinitperiod}, given={Divya}, giveni={D
[250]
bibinitperiod}}}% {{hash=8d49ae7f95c4bbd006065b253724d1e2}{% family={Rastogi}, familyi={R
[251]
bibinitperiod}, given={Aseem}, giveni={A
[252]
bibinitperiod}}}% {{hash=f5c184ac68798ea801914f18e49d22bd}{% family={Sharma}, familyi={S
[253]
bibinitperiod}, given={Rahul}, giveni={R
[254]
bibinitperiod}}}% {{hash=9c2effc0d41fc5a608085418fa629671}{% family={Tripathi}, familyi={T
[255]
bibinitperiod}, given={Shardul}, giveni={S
[256]
bibinitperiod}}}% }
[257]
strng{namehash}{43907019ef955fa716d69a188097b3ec}
[258]
strng{fullhash}{43907019ef955fa716d69a188097b3ec}
[259]
strng{bibnamehash}{43907019ef955fa716d69a188097b3ec}
[260]
strng{authorbibnamehash}{43907019ef955fa716d69a188097b3ec}
[261]
strng{authornamehash}{43907019ef955fa716d69a188097b3ec}
[262]
strng{authorfullhash}{43907019ef955fa716d69a188097b3ec}
[263]
field{sortinit}{C}
[264]
field{sortinithash}{963e9d84a3da2344e8833203de5aed05}
[265]
field{labelnamesource}{author}
[266]
field{labeltitlesource}{title}
[267]
field{journaltitle}{{IACR} Cryptology ePrint Archive}
[268]
field{title}{EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation}
[269]
field{volume}{2017}
[270]
field{year}{2017}
[271]
field{pages}{1109}
[272]
range{pages}{1}
[273]
[274]
entry{STOC:ChaCreDam88}{inproceedings}{}
[275]
name{author}{3}{}{% {{hash=615e97951d5e1c224ddda5bded8c9081}{% family={Chaum}, familyi={C
[276]
bibinitperiod}, given={David}, giveni={D
[277]
bibinitperiod}}}% {{hash=c81670f13dcbf424cef091233fd5f75d}{% family={Cr{é}peau}, familyi={C
[278]
bibinitperiod}, given={Claude}, giveni={C
[279]
bibinitperiod}}}% {{hash=b96a81211f8463e35325221d434eb477}{% family={Damg{å}rd}, familyi={D
[280]
bibinitperiod}, given={Ivan}, giveni={I
[281]
bibinitperiod}}}% }
[282]
list{location}{1}{% {Chicago, IL, USA}% }
[283]
list{publisher}{1}{% {{ACM} Press}% }
[284]
strng{namehash}{169fb00f5ed1be1058087dd822b68433}
[285]
strng{fullhash}{169fb00f5ed1be1058087dd822b68433}
[286]
strng{bibnamehash}{169fb00f5ed1be1058087dd822b68433}
[287]
strng{authorbibnamehash}{169fb00f5ed1be1058087dd822b68433}
[288]
strng{authornamehash}{169fb00f5ed1be1058087dd822b68433}
[289]
strng{authorfullhash}{169fb00f5ed1be1058087dd822b68433}
[290]
field{sortinit}{C}
[291]
field{sortinithash}{963e9d84a3da2344e8833203de5aed05}
[292]
field{labelnamesource}{author}
[293]
field{labeltitlesource}{title}
[294]
field{booktitle}{20th ACM STOC}
[295]
field{month}{5 2--4,}
[296]
field{title}{Multiparty Unconditionally Secure Protocols (Extended Abstract)}
[297]
field{year}{1988}
[298]
field{pages}{11
[299]
bibrangedash 19}
[300]
range{pages}{9}
[301]
[302]
verb 10.1145/62212.62214
[303]
[304]
[305]
entry{Chong:2007}{inproceedings}{}
[306]
name{author}{7}{}{% {{hash=bdb41de68e48d58bdaeb35d428b1b7ca}{% family={Chong}, familyi={C
[307]
bibinitperiod}, given={Stephen}, giveni={S
[308]
bibinitperiod}}}% {{hash=a3361c4566a9df8bf901bb866eb349b3}{% family={Liu}, familyi={L
[309]
bibinitperiod}, given={Jed}, giveni={J
[310]
bibinitperiod}}}% {{hash=61af8dfa5e75c5c4d03ec3fd9d1c75ce}{% family={Myers}, familyi={M
[311]
bibinitperiod}, given={Andrew
[312]
bibnamedelima C.}, giveni={A
[313]
bibinitperiod
[314]
bibinitdelim C
[315]
bibinitperiod}}}% {{hash=1c42cc4d735570d7d4bae963ccefbb49}{% family={Qi}, familyi={Q
[316]
bibinitperiod}, given={Xin}, giveni={X
[317]
bibinitperiod}}}% {{hash=f0984fda3c1ae89ad0060ba7bec1c138}{% family={Vikram}, familyi={V
[318]
bibinitperiod}, given={K.}, giveni={K
[319]
bibinitperiod}}}% {{hash=f1c5a9f64e2e150feed578bbef475fa4}{% family={Zheng}, familyi={Z
[320]
bibinitperiod}, given={Lantian}, giveni={L
[321]
bibinitperiod}}}% {{hash=37fdc04e7a14ce889c0671450cdcfe9d}{% family={Zheng}, familyi={Z
[322]
bibinitperiod}, given={Xin}, giveni={X
[323]
bibinitperiod}}}% }
[324]
list{location}{1}{% {Stevenson, Washington, USA}% }
[325]
list{publisher}{1}{% {ACM}% }
[326]
strng{namehash}{02e4af8f414e00faa55820c82152bf87}
[327]
strng{fullhash}{02e4af8f414e00faa55820c82152bf87}
[328]
strng{bibnamehash}{02e4af8f414e00faa55820c82152bf87}
[329]
strng{authorbibnamehash}{02e4af8f414e00faa55820c82152bf87}
[330]
strng{authornamehash}{02e4af8f414e00faa55820c82152bf87}
[331]
strng{authorfullhash}{02e4af8f414e00faa55820c82152bf87}
[332]
field{sortinit}{C}
[333]
field{sortinithash}{963e9d84a3da2344e8833203de5aed05}
[334]
field{labelnamesource}{author}
[335]
field{labeltitlesource}{title}
[336]
field{booktitle}{Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles}
[337]
field{isbn}{978--1--59593--591--5}
[338]
field{numpages}{14}
[339]
field{series}{SOSP '07}
[340]
field{title}{Secure Web Applications via Automatic Partitioning}
[341]
field{year}{2007}
[342]
field{pages}{31
[343]
bibrangedash 44}
[344]
range{pages}{14}
[345]
[346]
verb 10.1145/1294261.1294265
[347]
[348]
verb{urlraw}
[349]
verb http://doi.acm.org/10.1145/1294261.1294265
[350]
[351]
[352]
verb http://doi.acm.org/10.1145/1294261.1294265
[353]
[354]
keyw{compilers,information flow,security policies}
[355]
[356]
entry{AC:CLOPS13}{inproceedings}{}
[357]
name{author}{5}{}{% {{hash=13345f78d6907e5e34d57e39a7dbf918}{% family={Choudhury}, familyi={C
[358]
bibinitperiod}, given={Ashish}, giveni={A
[359]
bibinitperiod}}}% {{hash=8ffa13aac95e10f57ddf46515218a434}{% family={Loftus}, familyi={L
[360]
bibinitperiod}, given={Jake}, giveni={J
[361]
bibinitperiod}}}% {{hash=10a32b9e34c6e80769fa229eeec0493c}{% family={Orsini}, familyi={O
[362]
bibinitperiod}, given={Emmanuela}, giveni={E
[363]
bibinitperiod}}}% {{hash=9ba6677b898bd0f34a25e5cf02ebd393}{% family={Patra}, familyi={P
[364]
bibinitperiod}, given={Arpita}, giveni={A
[365]
bibinitperiod}}}% {{hash=b57129f2462343dbe66b375c6cfd6eaa}{% family={Smart}, familyi={S
[366]
bibinitperiod}, given={Nigel
[367]
bibnamedelima P.}, giveni={N
[368]
bibinitperiod
[369]
bibinitdelim P
[370]
bibinitperiod}}}% }
[371]
name{editor}{2}{}{% {{hash=77c7cff1f1a577742f53c591c97fccac}{% family={Sako}, familyi={S
[372]
bibinitperiod}, given={Kazue}, giveni={K
[373]
bibinitperiod}}}% {{hash=e675941ebf5993e9045c0f6ad7b39585}{% family={Sarkar}, familyi={S
[374]
bibinitperiod}, given={Palash}, giveni={P
[375]
bibinitperiod}}}% }
[376]
list{location}{1}{% {Bengalore, India}% }
[377]
list{publisher}{1}{% {Springer, Heidelberg, Germany}% }
[378]
strng{namehash}{15d283239cdcf1869f51d5dc1875096a}
[379]
strng{fullhash}{15d283239cdcf1869f51d5dc1875096a}
[380]
strng{bibnamehash}{15d283239cdcf1869f51d5dc1875096a}
[381]
strng{authorbibnamehash}{15d283239cdcf1869f51d5dc1875096a}
[382]
strng{authornamehash}{15d283239cdcf1869f51d5dc1875096a}
[383]
strng{authorfullhash}{15d283239cdcf1869f51d5dc1875096a}
[384]
strng{editorbibnamehash}{6ce7aad2a4e9f88d33d6d90dea332087}
[385]
strng{editornamehash}{6ce7aad2a4e9f88d33d6d90dea332087}
[386]
strng{editorfullhash}{6ce7aad2a4e9f88d33d6d90dea332087}
[387]
field{sortinit}{C}
[388]
field{sortinithash}{963e9d84a3da2344e8833203de5aed05}
[389]
field{labelnamesource}{author}
[390]
field{labeltitlesource}{title}
[391]
field{booktitle}{ASIACRYPT 2013, Part II}
[392]
field{month}{12 1--5,}
[393]
field{series}{{LNCS}}
[394]
field{title}{Between a Rock and a Hard Place: Interpolating between {MPC} and {FHE}}
[395]
field{volume}{8270}
[396]
field{year}{2013}
[397]
field{pages}{221
[398]
bibrangedash 240}
[399]
range{pages}{20}
[400]
[401]
verb 10.1007/978--3--642--42045-0_12
[402]
[403]
[404]
entry{Cytron:1991}{article}{}
[405]
name{author}{5}{}{% {{hash=d3bf95fb7ffd4d52d1aaf099ebc2c62d}{% family={Cytron}, familyi={C
[406]
bibinitperiod}, given={Ron}, giveni={R
[407]
bibinitperiod}}}% {{hash=a825af87e6c4e5560a8dad0db67120a9}{% family={Ferrante}, familyi={F
[408]
bibinitperiod}, given={Jeanne}, giveni={J
[409]
bibinitperiod}}}% {{hash=a2c9dd42e5c3e22d1ae7b84922fd7c6b}{% family={Rosen}, familyi={R
[410]
bibinitperiod}, given={Barry
[411]
bibnamedelima K.}, giveni={B
[412]
bibinitperiod
[413]
bibinitdelim K
[414]
bibinitperiod}}}% {{hash=3e337a50f8a18697d62d915244009d00}{% family={Wegman}, familyi={W
[415]
bibinitperiod}, given={Mark
[416]
bibnamedelima N.}, giveni={M
[417]
bibinitperiod
[418]
bibinitdelim N
[419]
bibinitperiod}}}% {{hash=f7b1172decec8c47fb496397e61ab24c}{% family={Zadeck}, familyi={Z
[420]
bibinitperiod}, given={F.
[421]
bibnamedelimi Kenneth}, giveni={F
[422]
bibinitperiod
[423]
bibinitdelim K
[424]
bibinitperiod}}}% }
[425]
list{location}{1}{% {New York, NY, USA}% }
[426]
list{publisher}{1}{% {ACM}% }
[427]
strng{namehash}{cdc07eca9047bfd7a0af5064c60e42b8}
[428]
strng{fullhash}{cdc07eca9047bfd7a0af5064c60e42b8}
[429]
strng{bibnamehash}{cdc07eca9047bfd7a0af5064c60e42b8}
[430]
strng{authorbibnamehash}{cdc07eca9047bfd7a0af5064c60e42b8}
[431]
strng{authornamehash}{cdc07eca9047bfd7a0af5064c60e42b8}
[432]
strng{authorfullhash}{cdc07eca9047bfd7a0af5064c60e42b8}
[433]
field{sortinit}{C}
[434]
field{sortinithash}{963e9d84a3da2344e8833203de5aed05}
[435]
field{labelnamesource}{author}
[436]
field{labeltitlesource}{title}
[437]
field{issn}{0164-0925}
[438]
field{journaltitle}{ACM Trans. Program. Lang. Syst.}
[439]
field{month}{10}
[440]
field{number}{4}
[441]
field{numpages}{40}
[442]
field{title}{Efficiently Computing Static Single Assignment Form and the Control Dependence Graph}
[443]
field{volume}{13}
[444]
field{year}{1991}
[445]
field{pages}{451
[446]
bibrangedash 490}
[447]
range{pages}{40}
[448]
[449]
verb 10.1145/115372.115320
[450]
[451]
verb{urlraw}
[452]
verb http://doi.acm.org/10.1145/115372.115320
[453]
[454]
[455]
verb http://doi.acm.org/10.1145/115372.115320
[456]
[457]
keyw{control dependence,control flow graph,def-use chain,dominator,optimizing compilers}
[458]
[459]
entry{NDSS:DemSchZoh15}{inproceedings}{}
[460]
name{author}{3}{}{% {{hash=376a47a3c15967cd4525ebff96201eb6}{% family={Demmler}, familyi={D
[461]
bibinitperiod}, given={Daniel}, giveni={D
[462]
bibinitperiod}}}% {{hash=5d62da517b335078f08436fbab3a5f69}{% family={Schneider}, familyi={S
[463]
bibinitperiod}, given={Thomas}, giveni={T
[464]
bibinitperiod}}}% {{hash=4ef91305cf3e296815bbb67ee9321367}{% family={Zohner}, familyi={Z
[465]
bibinitperiod}, given={Michael}, giveni={M
[466]
bibinitperiod}}}% }
[467]
list{location}{1}{% {San Diego, CA, USA}% }
[468]
list{publisher}{1}{% {The Internet Society}% }
[469]
strng{namehash}{e07d3355388099cf04a436098af3896f}
[470]
strng{fullhash}{e07d3355388099cf04a436098af3896f}
[471]
strng{bibnamehash}{e07d3355388099cf04a436098af3896f}
[472]
strng{authorbibnamehash}{e07d3355388099cf04a436098af3896f}
[473]
strng{authornamehash}{e07d3355388099cf04a436098af3896f}
[474]
strng{authorfullhash}{e07d3355388099cf04a436098af3896f}
[475]
field{sortinit}{D}
[476]
field{sortinithash}{2ef1bd9a78cc71eb74d7231c635177b8}
[477]
field{labelnamesource}{author}
[478]
field{labeltitlesource}{title}
[479]
field{booktitle}{NDSS 2015}
[480]
field{month}{2 8--11,}
[481]
field{title}{{ABY} - {A} Framework for Efficient Mixed-Protocol Secure Two-Party Computation}
[482]
field{year}{2015}
[483]
[484]
entry{DBLP:conf/cc/FranzHKSV14}{inproceedings}{}
[485]
name{author}{5}{}{% {{hash=5441f66f51249100545f3eff6b64852a}{% family={Franz}, familyi={F
[486]
bibinitperiod}, given={Martin}, giveni={M
[487]
bibinitperiod}}}% {{hash=8977b69d7a7c6dabe03f6aa0bfbfaa43}{% family={Holzer}, familyi={H
[488]
bibinitperiod}, given={Andreas}, giveni={A
[489]
bibinitperiod}}}% {{hash=b9e502f041dbf3b5d3c907a9d726cf59}{% family={Katzenbeisser}, familyi={K
[490]
bibinitperiod}, given={Stefan}, giveni={S
[491]
bibinitperiod}}}% {{hash=0bdeeec43787159d02e7574829c43c3d}{% family={Schallhart}, familyi={S
[492]
bibinitperiod}, given={Christian}, giveni={C
[493]
bibinitperiod}}}% {{hash=5ac94523768e8fc4adb7a926b36d83e0}{% family={Veith}, familyi={V
[494]
bibinitperiod}, given={Helmut}, giveni={H
[495]
bibinitperiod}}}% }
[496]
strng{namehash}{cf8519a3fcfd161b74167e5aa3f4c163}
[497]
strng{fullhash}{cf8519a3fcfd161b74167e5aa3f4c163}
[498]
strng{bibnamehash}{cf8519a3fcfd161b74167e5aa3f4c163}
[499]
strng{authorbibnamehash}{cf8519a3fcfd161b74167e5aa3f4c163}
[500]
strng{authornamehash}{cf8519a3fcfd161b74167e5aa3f4c163}
References 501 through 1,243 have been omitted.

Cited By

View all
  • (2024)PP-CSA: Practical Privacy-Preserving Software Call Stack AnalysisProceedings of the ACM on Programming Languages10.1145/36498568:OOPSLA1(1264-1293)Online publication date: 29-Apr-2024
  • (2024)Estimating the Runtime and Global Network Traffic of SMPC ProtocolsProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653258(7-18)Online publication date: 19-Jun-2024
  • (2024)Secure Synthesis of Distributed Cryptographic Applications2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00021(433-448)Online publication date: 8-Jul-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
November 2019
2755 pages
ISBN:9781450367479
DOI:10.1145/3319535
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 November 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptography
  2. linear programming
  3. multiparty computation
  4. program analysis
  5. protocol mixing

Qualifiers

  • Research-article

Funding Sources

Conference

CCS '19
Sponsor:

Acceptance Rates

CCS '19 Paper Acceptance Rate 149 of 934 submissions, 16%;
Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)362
  • Downloads (Last 6 weeks)21
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)PP-CSA: Practical Privacy-Preserving Software Call Stack AnalysisProceedings of the ACM on Programming Languages10.1145/36498568:OOPSLA1(1264-1293)Online publication date: 29-Apr-2024
  • (2024)Estimating the Runtime and Global Network Traffic of SMPC ProtocolsProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653258(7-18)Online publication date: 19-Jun-2024
  • (2024)Secure Synthesis of Distributed Cryptographic Applications2024 IEEE 37th Computer Security Foundations Symposium (CSF)10.1109/CSF61375.2024.00021(433-448)Online publication date: 8-Jul-2024
  • (2023)COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party ComputationProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623181(2531-2545)Online publication date: 15-Nov-2023
  • (2023)Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179397(848-863)Online publication date: May-2023
  • (2022)An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building BlocksIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences10.1587/transfun.2021TAP0004E105.A:3(404-416)Online publication date: 1-Mar-2022
  • (2022)ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833732(179-197)Online publication date: May-2022
  • (2022)CostCO: An automatic cost modeling framework for secure multi-party computation2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP53844.2022.00017(140-153)Online publication date: Jun-2022
  • (2022)Mixed-Technique Multi-Party Computations Composed of Two-Party ComputationsComputer Security – ESORICS 202210.1007/978-3-031-17143-7_15(295-319)Online publication date: 24-Sep-2022
  • (2021)Viaduct: an extensible, optimizing compiler for secure distributed programsProceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation10.1145/3453483.3454074(740-755)Online publication date: 19-Jun-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media