Confidential benchmarking based on multiparty computation

Ivan Damgård, Kasper Lyneborg Damgård, Kurt Nielsen, Peter Sebastian Nordholt, Tomas Toft

15 Citations (Scopus)

Abstract

We report on the design and implementation of a system that uses multiparty computation to enable banks to benchmark their customers’ confidential performance data against a large representative set of confidential performance data from a consultancy house. The system ensures that both the banks’ and the consultancy house’s data stays confidential, the banks as clients learn nothing but the computed benchmarking score. In the concrete business application, the developed prototype helps Danish banks to find the most efficient customers among a large and challenging group of agricultural customers with too much debt. We propose a model based on linear programming for doing the benchmarking and implement it using the SPDZ protocol by Damgård et al., which we modify using a new idea that allows clients to supply data and get output without having to participate in the preprocessing phase and without keeping state during the computation. We ran the system with two servers doing the secure computation using a database with information on about 2500 users. Answers arrived in about 25 s.

Original languageEnglish
Title of host publicationInternational Conference on Financial Cryptography and Data Security
EditorsJens Grossklags, Bart Preneel
PublisherSpringer
Publication date2017
Pages169-187
ISBN (Print)978-3-662-54970-4
DOIs
Publication statusPublished - 2017
EventFinancial Cryptography and Data Security, International Conference, 2016 - Christ Church, Barbados
Duration: 22 Feb 201626 Feb 2016
Conference number: 20

Conference

ConferenceFinancial Cryptography and Data Security, International Conference, 2016
Number20
Country/TerritoryBarbados
CityChrist Church
Period22/02/201626/02/2016
SeriesLecture notes in computer science
Volume9603
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Confidential benchmarking based on multiparty computation'. Together they form a unique fingerprint.

Cite this