TY - GEN
T1 - Secure Graph Analysis at Scale
AU - Araki, Toshinori
AU - Furukawa, Jun
AU - Ohara, Kazuma
AU - Pinkas, Benny
AU - Rosemarin, Hanan
AU - Tsuchida, Hikaru
N1 - Publisher Copyright: © 2021 ACM.
PY - 2021/11/12
Y1 - 2021/11/12
N2 - We present a highly-scalable secure computation of graph algorithms, which hides all information about the topology of the graph or other input values associated with nodes or edges. The setting is where all nodes and edges of the graph are secret-shared between multiple servers, and a secure computation protocol is run between these servers. While the method is general, we demonstrate it in a 3-server setting with an honest majority, with either semi-honest security or full security. A major technical contribution of our work is replacing the usage of secure sort protocols with secure shuffles, which are much more efficient. Full security against malicious behavior is achieved by adding an efficient verification for the shuffle operation, and computing circuits using fully secure protocols. We demonstrate the applicability of this technology by implementing two major algorithms: computing breadth-first search (BFS), which is also useful for contact tracing on private contact graphs, and computing maximal independent set (MIS). We implement both algorithms, with both semi-honest and full security, and run them within seconds on graphs of millions of elements.
AB - We present a highly-scalable secure computation of graph algorithms, which hides all information about the topology of the graph or other input values associated with nodes or edges. The setting is where all nodes and edges of the graph are secret-shared between multiple servers, and a secure computation protocol is run between these servers. While the method is general, we demonstrate it in a 3-server setting with an honest majority, with either semi-honest security or full security. A major technical contribution of our work is replacing the usage of secure sort protocols with secure shuffles, which are much more efficient. Full security against malicious behavior is achieved by adding an efficient verification for the shuffle operation, and computing circuits using fully secure protocols. We demonstrate the applicability of this technology by implementing two major algorithms: computing breadth-first search (BFS), which is also useful for contact tracing on private contact graphs, and computing maximal independent set (MIS). We implement both algorithms, with both semi-honest and full security, and run them within seconds on graphs of millions of elements.
KW - MPC
KW - oblivious shuffle
KW - oblivious sort
KW - secure multi-party computation
UR - http://www.scopus.com/inward/record.url?scp=85119362918&partnerID=8YFLogxK
U2 - https://doi.org/10.1145/3460120.3484560
DO - https://doi.org/10.1145/3460120.3484560
M3 - منشور من مؤتمر
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 610
EP - 629
BT - CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
T2 - 27th ACM Annual Conference on Computer and Communication Security, CCS 2021
Y2 - 15 November 2021 through 19 November 2021
ER -