Deploying Secure Multi-Party Computation for Financial Data Analysis

(Short Paper)
  • Dan Bogdanov
  • Riivo Talviste
  • Jan Willemson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7397)

Abstract

We show how to collect and analyze financial data for a consortium of ICT companies using secret sharing and secure multi-party computation (MPC). This is the first time where the actual MPC computation on real data was done over the internet with computing nodes spread geographically apart. We describe the technical solution and present user feedback revealing that MPC techniques give sufficient assurance for data donors to submit their sensitive information.

Keywords

financial data analysis secure multi-party computation 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    SecureSCM. Technical report D9.1: Secure Computation Models and Frameworks (July 2008), http://www.securescm.org
  2. 2.
    Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 470–488. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  3. 3.
    Batcher, K.E.: Sorting networks and their applications. In: Proc. of AFIPS 1968, pp. 307–314. ACM (1968)Google Scholar
  4. 4.
    Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proc. of CCS 2008, pp. 257–266. ACM (2008)Google Scholar
  5. 5.
    Bernstein, D.J.: ChaCha, a variant of Salsa20 (2008), http://cr.yp.to/chacha.html
  6. 6.
    Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. of AFIPS 1979, pp. 313–317. AFIPS Press (1979)Google Scholar
  7. 7.
    Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  8. 8.
    Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. Cryptology ePrint Archive, Report 2011/662 (2011)Google Scholar
  9. 9.
    Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure Multiparty Computation Goes Live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325–343. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In: Proc. of USENIX Security Symposium 2010, pp. 223–239 (2010)Google Scholar
  11. 11.
    Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Secure computation of surveys. In: EU Workshop on Secure Multiparty Protocols (2004)Google Scholar
  12. 12.
    Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Some requirements for adoption of privacy-preserving data mining. PORTIA Project White Paper (2005)Google Scholar
  13. 13.
    Henecka, W., Kögl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: TASTY: tool for automating secure two-party computations. In: Proc. of CCS 2010, pp. 451–462. ACM (2010)Google Scholar
  14. 14.
    Jagomägis, R.: SecreC: a privacy-aware programming language with applications in data mining. Master’s thesis, Inst. of Comp. Sci., Tartu University (2010)Google Scholar
  15. 15.
    Malka, L., Katz, J.: VMCrypt - modular software architecture for scalable secure computation. Cryptology ePrint Archive, Report 2010/584 (2010)Google Scholar
  16. 16.
    Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)MathSciNetMATHCrossRefGoogle Scholar
  17. 17.
    Talviste, R.: Deploying secure multiparty computation for joint data analysis — a case study. Master’s thesis, Inst. of Comp. Sci., Tartu University (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Dan Bogdanov
    • 1
    • 2
  • Riivo Talviste
    • 1
    • 2
    • 3
  • Jan Willemson
    • 1
    • 3
  1. 1.CyberneticaTallinnEstonia
  2. 2.Institute of Computer ScienceUniversity of TartuTartuEstonia
  3. 3.STACCTallinnEstonia

Personalised recommendations