Cryptology ePrint Archive: Report 2020/1512

Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking

Jan Pennekamp and Patrick Sapel and Ina Berenice Fink and Simon Wagner and Sebastian Reuter and Christian Hopmann and Klaus Wehrle and Martin Henze

Abstract: Benchmarking the performance of companies is essential to identify improvement potentials in various industries. Due to a competitive environment, this process imposes strong privacy needs, as leaked business secrets can have devastating effects on participating companies. Consequently, related work proposes to protect sensitive input data of companies using secure multi-party computation or homomorphic encryption. However, related work so far does not consider that also the benchmarking algorithm, used in today's applied real-world scenarios to compute all relevant statistics, itself contains significant intellectual property, and thus needs to be protected. Addressing this issue, we present PCB a practical design for Privacy-preserving Company Benchmarking that utilizes homomorphic encryption and a privacy proxy which is specifically tailored for realistic real-world applications in which we protect companies' sensitive input data and the valuable algorithms used to compute underlying key performance indicators. We evaluate PCB's performance using synthetic measurements and showcase its applicability alongside an actual company benchmarking performed in the domain of injection molding, covering 48 distinct key performance indicators calculated out of hundreds of different input values. By protecting the privacy of all participants, we enable them to fully profit from the benefits of company benchmarking.

Category / Keywords: applications / homomorphic encryption, practical encrypted computing, industrial application

Original Publication (in the same form): Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC '20), December 15, 2020, Virtual Event

Date: received 2 Dec 2020

Contact author: pennekamp at comsys rwth-aachen de

Available format(s): PDF | BibTeX Citation

Version: 20201202:150718 (All versions of this report)

Short URL: ia.cr/2020/1512


[ Cryptology ePrint archive ]