{"title":"一种自动化安全多方计算的脚本语言","authors":"Kung Chen, T. Hsu, C. Liau, Da-Wei Wang","doi":"10.1109/ASIAJCIS.2013.27","DOIUrl":null,"url":null,"abstract":"In this paper, we report our work on a scripting language for automating the development of complex protocols for a commodity-based approach to SMC. Our scripting language models the participating parties in a peer-to-peer symmetric manner that each party holds their private data as well as any intermediate results jointly. We propose a three-level security attributes, namely public, private, and shared, that users can employ to express their security requirements by associating variables with these attributes. Furthermore, these security attributes also direct how our compiler should perform security check as well as code generation. We show how complex protocols can be expressed in our scripting language and how the compiler works to generates code exploiting the distributed SMC runtime environment we developed.","PeriodicalId":286298,"journal":{"name":"2013 Eighth Asia Joint Conference on Information Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Scripting Language for Automating Secure Multiparty Computation\",\"authors\":\"Kung Chen, T. Hsu, C. Liau, Da-Wei Wang\",\"doi\":\"10.1109/ASIAJCIS.2013.27\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we report our work on a scripting language for automating the development of complex protocols for a commodity-based approach to SMC. Our scripting language models the participating parties in a peer-to-peer symmetric manner that each party holds their private data as well as any intermediate results jointly. We propose a three-level security attributes, namely public, private, and shared, that users can employ to express their security requirements by associating variables with these attributes. Furthermore, these security attributes also direct how our compiler should perform security check as well as code generation. We show how complex protocols can be expressed in our scripting language and how the compiler works to generates code exploiting the distributed SMC runtime environment we developed.\",\"PeriodicalId\":286298,\"journal\":{\"name\":\"2013 Eighth Asia Joint Conference on Information Security\",\"volume\":\"36 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Eighth Asia Joint Conference on Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ASIAJCIS.2013.27\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Eighth Asia Joint Conference on Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASIAJCIS.2013.27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Scripting Language for Automating Secure Multiparty Computation
In this paper, we report our work on a scripting language for automating the development of complex protocols for a commodity-based approach to SMC. Our scripting language models the participating parties in a peer-to-peer symmetric manner that each party holds their private data as well as any intermediate results jointly. We propose a three-level security attributes, namely public, private, and shared, that users can employ to express their security requirements by associating variables with these attributes. Furthermore, these security attributes also direct how our compiler should perform security check as well as code generation. We show how complex protocols can be expressed in our scripting language and how the compiler works to generates code exploiting the distributed SMC runtime environment we developed.