Author:
Fan Yuxin,Song Fu,Chen Taolue,Zhang Liangfeng,Liu Wanwei
Abstract
AbstractSecure multi-party computation (MPC) is a promising technique for privacy-persevering applications. A number of MPC frameworks have been proposed to reduce the burden of designing customized protocols, allowing non-experts to quickly develop and deploy MPC applications. To improve performance, recent MPC frameworks allow users to declare variables secret only for these which are to be protected. However, in practice, it is usually highly non-trivial for non-experts to specify secret variables: declaring too many degrades the performance while declaring too less compromises privacy. To address this problem, in this work we propose an automated security policy synthesis approach to declare as few secret variables as possible but without compromising security. Our approach is a synergistic integration of type inference and symbolic reasoning. The former is able to quickly infer a sound—but sometimes conservative—security policy, whereas the latter allows to identify secret variables in a security policy that can be declassified in a precise manner. Moreover, the results from symbolic reasoning are fed back to type inference to refine the security types even further. We implement our approach in a new tool PoS4MPC. Experimental results on five typical MPC applications confirm the efficacy of our approach.
Publisher
Springer International Publishing
Reference45 articles.
1. The LLVM compiler infrastructure. https://llvm.org
2. The source code of our benchmarks (2022). https://github.com/SPoS4/PoS4MPC
3. Almeida, J.B., Barbosa, M., Barthe, G., Pacheco, H., Pereira, V., Portela, B.: Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks. In: CSF, pp. 132–146 (2018)
4. Amtoft, T., Bandhakavi, S., Banerjee, A.: A logic for information flow in object-oriented programs. In: POPL, pp. 91–102 (2006)
5. Andreea, I.: Private set intersection: past, present and future. In: SECRYPT, pp. 680–685 (2021)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy-Preserving Techniques and User Anonymity in the Metaverse;Advances in Information Security, Privacy, and Ethics;2024-08-21
2. Towards Efficient Verification of Constant-Time Cryptographic Implementations;Proceedings of the ACM on Software Engineering;2024-07-12
3. DeJITLeak: eliminating JIT-induced timing side-channel leaks;Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2022-11-07
4. PoS4MPC: Automated Security Policy Synthesis for Secure Multi-party Computation;Computer Aided Verification;2022