Cryptology ePrint Archive: Report 2013/371
Domain-Polymorphic Programming of Privacy-Preserving Applications
Dan Bogdanov and Peeter Laud and Jaak Randmets
Abstract: Secure Multiparty Computation (SMC) is seen as one of the main enablers for secure outsourcing of computation. Currently, there are many different SMC techniques (garbled circuits, secret sharing, homomorphic encryption, etc.) and none of them is clearly superior to others in terms of efficiency, security guarantees, ease of implementation, etc. For maximum efficiency, and for obeying the trust policies, a privacy-preserving application may wish to use several different SMC techniques for different operations it performs. A straightforward implementation of this application may result in a program that
(i) contains a lot of duplicated code, differing only in the used SMC technique;
(ii) is difficult to maintain, if policies or SMC implementations change; and
(iii) is difficult to reuse in similar applications using different SMC techniques.
In this paper, we propose a programming language with associated compilation techniques for simple orchestration of multiple SMC techniques and multiple protection domains. It is a simple imperative language with function calls where the types of data items are annotated with protection domains and where the function declarations may be domain-polymorphic. This allows most of the program code working with private data to be written in a SMC-technique-agnostic manner. It also allows rapid deployment of new SMC techniques and implementations in existing applications. We have implemented the compiler for the language, integrated it with an existing SMC framework, and are currently using it for new privacy-preserving applications.
Category / Keywords: implementation / secure multiparty computation
Date: received 10 Jun 2013
Contact author: peeter laud at cyber ee
Available format(s): PDF | BibTeX Citation
Version: 20130612:144949 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]