{"title":"A Scripting Language for Automating Secure Multiparty Computation","authors":"Kung Chen, T. Hsu, C. Liau, Da-Wei Wang","doi":"10.1109/ASIAJCIS.2013.27","DOIUrl":null,"url":null,"abstract":"In this paper, we report our work on a scripting language for automating the development of complex protocols for a commodity-based approach to SMC. Our scripting language models the participating parties in a peer-to-peer symmetric manner that each party holds their private data as well as any intermediate results jointly. We propose a three-level security attributes, namely public, private, and shared, that users can employ to express their security requirements by associating variables with these attributes. Furthermore, these security attributes also direct how our compiler should perform security check as well as code generation. We show how complex protocols can be expressed in our scripting language and how the compiler works to generates code exploiting the distributed SMC runtime environment we developed.","PeriodicalId":286298,"journal":{"name":"2013 Eighth Asia Joint Conference on Information Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Eighth Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASIAJCIS.2013.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we report our work on a scripting language for automating the development of complex protocols for a commodity-based approach to SMC. Our scripting language models the participating parties in a peer-to-peer symmetric manner that each party holds their private data as well as any intermediate results jointly. We propose a three-level security attributes, namely public, private, and shared, that users can employ to express their security requirements by associating variables with these attributes. Furthermore, these security attributes also direct how our compiler should perform security check as well as code generation. We show how complex protocols can be expressed in our scripting language and how the compiler works to generates code exploiting the distributed SMC runtime environment we developed.