Choose wisely: A comparison of secure two-party computation frameworks

9Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Secure Two-Party Computation (STC), despite being a powerful tool for privacy engineers, is rarely used practically due to two reasons: i) STCs incur significant overheads and ii) developing efficient STCs requires expert knowledge. Recent works propose a variety of frameworks that address these problems. However, the varying assumptions, scenarios, and benchmarks in these works render results incomparable. It is thus hard, if not impossible, for an inexperienced developer of STCs to choose the best framework for her task. In this paper, we present a thorough quantitative performance analysis of recent STC frameworks. Our results reveal significant performance differences and we identify potential for optimizations as well as new research directions for STC. Complemented by a qualitative discussion of the frameworks' usability, our results provide privacy engineers with a dependable information basis to take the decision for the right STC framework fitting their application.

Cite

CITATION STYLE

APA

Ziegeldorf, J. H., Metzke, J., Henze, M., & Wehrle, K. (2015). Choose wisely: A comparison of secure two-party computation frameworks. In Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015 (pp. 198–205). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SPW.2015.9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free