What is Secure Multiparty Computation?
Last Updated :
26 Aug, 2024
Data Security and privacy have grown to be everyone's top worries over the past few decades. Data security and privacy in distributed networks have become a major concern with the growth of the internet and technology. By enabling partners to compute a function on their private inputs without disclosing them to third parties, Secure Multiparty Computation (SMPC) presents a viable solution to this problem.
What is Secure Multiparty Computation?
With the use of the cryptographic approach known as "secure multiparty computation," "n" parties can securely compute a function together without disclosing each other's unique inputs. This preserves data privacy while enabling computations and analysis. When privacy is important, whether in financial transactions, healthcare data, or personal information shared between various institutions, SMPC is used.
History
Secure multiparty computation started early in the 1970s. It was known as multiparty computation at that time. It did not gain popularity at that time as it was not implemented practically. In the 1982’s it was introduced as secure two-party multiparty computation. It is used to solve a lot of problems of computation without revealing the inputs to other parties. Finally, it came with a name as secure multiparty computation in which the functions of different types are computed, that is the reason it is sometimes called SFE- Secure Function Evaluation.
- The secure multiparty computation is used for the utilization of data without compromising privacy.
- It is the cryptographic subfield that helps in preserving the privacy of the data.
- Emerging technologies like blockchain, mobile computing, IoT, and cloud computing have resulted in the rebirth of secure multiparty computation.
- Secure multiparty computation has become a hot area of research in the last decade due to the rise of blockchain technology.
- The researchers are now more interested in implementing secure multiparty computation in distributed systems.
- Unlike in centralized systems, secure multiparty computation may have better performance in distributed systems.
Architecture
The secure multiparty computation provides a protocol where no individual can see the other parties data while distributing the data across multi parties. It enables the data scientists and analysts to compute privately on the distributed data without exposing it.
Multiparty sharing data among each other with any third party using a specified protocol.The co-workers want to compute the maximum salary without revealing their salary to others. To perform such a computation, secure multiparty computation is implemented to calculate the maximum salary. The parties in a distributed manner jointly perform a function to calculate it without revealing the salary. Data in use is kept in encrypted form, broken up, and distributed across parties, there are no chances of quantum attacks. It is impossible to have a trusted party in the real world, as all parties communicate with each other in one or the other way In such a scenario, the parties may get corrupted. The corrupted parties have behavior like semi-honest and malicious.
- A semi-honest opponent is one who follows the specified protocol but corrupts the parties corrupted. The protocol is run honestly, but they try to extract information from the messages exchanged between parties.
- A malicious adversary attempts to breach security and does not follow the specified protocol. The adversary can make the changes during the execution process of the protocol. While using multiparty computation, we assume the party is honest and follows all the protocols.
Example
Suppose we want to compute the average salary among three employees without revealing the actual salary, for such problems, one can use secure multiparty computation. Let's take an example-
Example of computing average salary of multiparty using additive sharing.A mathematical representation of the problem can be given as:
F(A, B, C) = Average (A, B, C)
Sam, Bob, and Cassy want to calculate their average salary.
- Say Sam's salary is $40k. Using additive sharing, $40k is split into randomly generated three pieces $44k, $-11k, and $7k.
- Sam keeps one of these secret pieces with herself and distributes the other two to each.
- The same procedure is followed by all three.
- Secret sharing keeps the data in encrypted form when in use. The procedure is given below-
Sam | Bob | Cassy | |
44 | -11 | 7 | $40 |
-6 | 32 | 24 | $50 |
20 | 0 | 40 | $60 |
$58 | $21 | $71 | |
Total salary = $150
Average Salary = 150/3
= $50
From the above data shared,A mathematical there is no clue about the actual salary, but the average salary is being calculated.
Techniques
There are several techniques developed for secure multiparty computation protocol construction having different features. Some techniques used in secure Multiparty computation are listed below:
- Shamir Secret Sharing: Secret sharing is utilized as the basic tool when there is an honest majority in secure multiparty computation. A secret sharing scheme is that a secret s is shared among n parties, such that t+1 or more parties come together to reconstruct the secret. The parties lesser than t cannot get any information or reconstruct the secret. The scheme that fulfills the requirements of t+1 out of n is called the threshold secret sharing scheme.
- Honest Majority MPC: The function can either be represented by Boolean or an arithmetic circuit in an honest majority. For MPC-based secret sharing having the honest majority, there is finite field Zp with p>n for the arithmetic circuit, and the circuit is Turing complete.
- Input sharing: Every party shares the input using the Shamir secret sharing. The circuit is provided as the input for computation. Every party keeps his input private by adding some random number to the input and finally, after getting the output the random number known to the party is removed, and we get the output.
- Circuit evaluation: The circuit is evaluated by parties one gate at a time. The gates are evaluated serially from input to output. The evaluation consists of the computation of addition and multiplication gates. For inputs a(x) and b(x), the output of addition for the ith party is calculated as c(i) = a(i) + b(i). Similarly, the output of multiplication for the ith party is calculated as c(i) = a(i). b(i).
- Private set intersection: The private set intersection protocol is very efficient for the two parties' problems. For two parties who wish to find the elements of intersection with a private set of inputs without revealing the input, the private set intersection is a better approach for both honest and dishonest adversaries.
- Threshold cryptography: Threshold cryptography aims to carry out the cryptographic operations for a set of parties without holding the secret by any of single party. RSA algorithm is used for the scheme where the basic function is y=xe mod n. RSA is used for encrypting secrets or messages.
- Dishonest majority MPC: In the secure multiparty computation, there can be both honest and dishonest parties. The Multiparty computation is secure as long as there is an honest majority. If the adversaries are corrupt more than the majority, new approaches are required for security. For the dishonest majority, there are protocols like GMW oblivious transfer, garbled circuit, Tiny oz, and many more protocols.
Benefits Of Secure Multiparty Computation
Let's discuss some benefits of secure multiparty computation:
- Trusted third party: In Secure Multiparty Computation, we can share data in a distributed manner with different organizations without any third party and even the privacy of data will be preserved while sharing data.
- Data Privacy: The private data of organizations can be shared for computation purposes. The concern of data privacy is provided by using secure multiparty computation, which keeps the data in use in encrypted form. Thus, the data is not revealed or compromised.
- High accuracy: Secure Multiparty Computation provides highly accurate results for different computations using cryptography.
- Quantum safe: The data shared between parties is safe against quantum attacks, as the data is broken up and encrypted when distributed among parties for computation.
Limitations Of Secure Multiparty Computation
Secure multiparty computation is being used for solving different problems, but there are a few limitations. The main limitations are the computational overhead and high communication costs.
- Computational overhead: To provide the security we need to generate the random numbers, the random number generation requires more computation overhead which slows down runtime.
- High communication costs: Distributing the data to multiple parties for computation over the networks leads to higher costs of communication.
Conclusion
Secure Multiparty Computation (SMPC) is a robust cryptographic technique that allows for secure computations on private data without revealing the data itself. While SMPC offers significant benefits such as data privacy and resistance to quantum attacks, it also comes with limitations, including computational overhead and communication costs. With the rise of distributed technologies like blockchain and cloud computing, SMPC is becoming an increasingly important tool for privacy-preserving computations.
Similar Reads
Secure coding - What is it all about?
So you think you can code? Well thatâs great to know⦠The world definitely needs more geeks and nerds like you and me⦠But, are your programs secure? This is what this whole article is all about. As a programmer, it is not only your job but also moral responsibility to ensure that your codes donât h
6 min read
What is Secure Remote Access?
Secure remote access, As the name suggests secure means it secures our applications or business-related information. It prevents the loss of sensitive information or data. In this article, we will cover a brief explanation of secure remote access and how it works, What technologies are used for Secu
9 min read
Blockchain to Secure IoT Data
INTRODUCTION: Internet of things and Blockchain are two technologies which are gaining popularity since the time of their creation. In the near future, IoT is going to influence almost every day-to-day items we use. As the usage of this technology increases, the threat to misuse it also increases. E
7 min read
What is SMP (Symmetric Multi-Processing)?
Multiprocessing(MP), involves computer hardware and software architecture where there are multiple(two or more) processing units executing programs for the single operating(computer) system. SMP i.e. symmetric multiprocessing, refers to the computer architecture where multiple identical processors a
2 min read
Best Practices for Secure Coding in Web Applications
Web applications are essential for corporations to deliver digital offerings, and they have got grow to be increasingly important in recent years as increasingly human beings get proper access to offerings online. However, with the upward push of cyber-assaults and data breaches, itâs vital to put i
6 min read
Computer Security and its Challenges
There are three main objectives of computer security, which are also referred has CIA triads. ConfidentialityIntegrityAvailability 1. Confidentiality : Data confidentiality - It is a property which ensures that any private information that can be harmful if it is disclosed to any unauthorized person
2 min read
Introduction To Classic Security Models
These models are used for maintaining goals of security, i.e. Confidentiality, Integrity, and Availability. In simple words, it deals with CIA Triad maintenance. There are 3 main types of Classic Security Models. Bell-LaPadula BibaClarke Wilson Security Model1. Bell-LaPadula This Model was invented
3 min read
Message Passing Model of Process Communication
So message passing means how a message can be sent from one end to the other end. Either it may be a client-server model or it may be from one node to another node. The formal model for distributed message passing has two timing models one is synchronous and the other is asynchronous. The fundamenta
3 min read
5 Best Practices for Secure File Sharing
Businesses tend to thrive with the timely sharing of information or data. It is important for the organization to have access to the information that they need to accomplish their tasks, efficiently and conveniently. And that's why file-sharing is quite important to any business. Fortunately, techno
4 min read
Message Authentication Requirements
Data is prone to various attacks. One of these attacks includes message authentication. This threat arises when the user does not have any information about the originator of the message. Message authentication can be achieved using cryptographic methods which further make use of keys. Authenticatio
4 min read