Go to:
Logótipo
Comuta visibilidade da coluna esquerda
Você está em: Start > Publications > View > Breaking MPC implementations through compression
Publication

Publications

Breaking MPC implementations through compression

Title
Breaking MPC implementations through compression
Type
Article in International Scientific Journal
Year
2019
Journal
Vol. 18
Pages: 505-518
ISSN: 1615-5262
Publisher: Springer Nature
Other information
Authenticus ID: P-00Q-1TP
Abstract (EN): There are many cryptographic protocols in the literature that are scientifically and mathematically sound. By extension, cryptography today seeks to respond to numerous properties of the communication process beyond confidentiality (secrecy), such as integrity, authenticity, and anonymity. In addition to the theoretical evidence, implementations must be equally secure. Due to the ever-increasing intrusion from governments and other groups, citizens are now seeking alternatives ways of communication that do not leak information. In this paper, we analyze multiparty computation (MPC), which is a sub-field of cryptography with the goal of creating methods for parties to jointly compute a function over their inputs while keeping those inputs private. This is a very useful method that can be used, for example, to carry out computations on anonymous data without having to leak that data. Thus, due to the importance of confidentiality in this type of technique, we analyze active and passive attacks using complexity measures (compression and entropy). We start by obtaining network traces and syscalls, then we analyze them using compression and entropy techniques. Finally, we cluster the traces and syscalls using standard clustering techniques. This approach does not need any deep specific knowledge of the implementations being analyzed. This paper presents a security analysis for four MPC frameworks, where three were identified as insecure. These insecure libraries leak information about the inputs provided by each party of the communication. Additionally, we have detected, through a careful analysis of its source code, that SPDZ-2's secret sharing schema always produces the same results.
Language: English
Type (Professor's evaluation): Scientific
No. of pages: 14
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same authors

The case for blockchain in IoT identity management (2022)
Article in International Scientific Journal
Sousa, PR; Resende, JS; Martins, R; antunes, l
Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE (2021)
Article in International Scientific Journal
Sousa, P; Magalhaes, L; Resende, J; Martins, R; antunes, l
pTASC: Trustable Autonomous Secure Communications (2019)
Article in International Conference Proceedings Book
Sousa, PR; Cirne, A; Resende, JS; Martins, R; antunes, l
Recommend this page Top
Copyright 1996-2025 © Faculdade de Direito da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-07 at 06:37:57 | Privacy Policy | Personal Data Protection Policy | Whistleblowing