Privacy-Preserving Methods for Sharing Financial Risk Exposures
@article{Abbe2011PrivacyPreservingMF, title={Privacy-Preserving Methods for Sharing Financial Risk Exposures}, author={Emmanuel Abbe and Amir Ehsan Khandani and Andrew W. Lo}, journal={ERN: Pricing (Topic)}, year={2011} }
Unlike other industries in which intellectual property is patentable, the financial industry relies on trade secrecy to protect its business processes and methods, which can obscure critical financial risk exposures from regulators and the public. We develop methods for sharing and aggregating such risk exposures that protect the privacy of all parties involved and without the need for a trusted third party. Our approach employs secure multi-party computation techniques from cryptography in…
39 Citations
Investcoin: A System for Privacy-Preserving Investments
- Computer Science, MathematicsArXiv
- 2017
A new framework for Privacy-Preserving Investment systems in a distributed model, independent investors can transfer funds to independent projects, and a simple decentralised key generation protocol for Investcoin supporting dynamic join/leave and fault-tolarance of investors and moreover achieves some security guarantees against malicious investors.
A Distributed Investment Encryption Scheme: Investcoin
- Computer Science, MathematicsCSCML
- 2017
A simple decentralised key generation protocol for Investcoin is provided that supports dynamic join, leave and fault-tolarance of investors and moreover achieves some security guarantees against malicious investors.
Cryptography and the Economics of Supervisory Information: Balancing Transparency and Confidentiality
- Economics
- 2013
We elucidate the tradeoffs between transparency and confidentiality in the context of financial regulation. The structure of information in financial contexts creates incentives with a pervasive…
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2020
Senate is presented, a system that allows multiple parties to collaboratively run analytical SQL queries without revealing their individual data to each other, and provides a new query planning algorithm that decomposes and plans the cryptographic computation effectively.
Computing Statistics from Private Data
- Computer ScienceData Sci. J.
- 2018
The primary goals of this work are to describe the computational needs of these disciplines and to develop a specific roadmap for selecting efficient algorithms and protocols that can be used as a starting point for interdisciplinary projects between cryptographers and data scientists.
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks
- BusinessSecur. Commun. Networks
- 2018
The paper proposes to combine secure multiparty computation cryptography methods with risk identification algorithms from social network analysis to address structural risk identification of supply chain networks without endangering firms’ competitive advantage.
Secure Multi-party Differential Privacy
- Computer Science, MathematicsNIPS
- 2015
This work studies the problem of interactive function computation by multiple parties, each possessing a bit, in a differential privacy setting, and finds the optimality of a simple non-interactive protocol: each party randomizes its bit (sufficiently) and shares the privatized version with the other parties.
Compute Globally, Act Locally: Protecting Federated Systems from Systemic Threats
- Computer ScienceHotDep
- 2014
This paper argues that the impending crisis could have been predicted by performing a specific distributed computation on the financial information of each bank, but that existing tools do not offer enough privacy to make participation safe from the banks' perspective and sketches the design of a system that can perform this computation at scale with strong privacy guarantees.
Private Liquidity Matching using MPC
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2021
A privacy-preserving netting protocol to solve the gridlock resolution problem in such Real Time Gross Settlement systems and is implemented in the SCALE MAMBA system, using Shamir secret sharing scheme over three parties in an actively secure manner.
HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2021
HOLMES is presented, a platform for expressing and performing statistical tests securely and efficiently and blends together zero-knowledge proofs (ZK) and SMPC protocols, based on the insight that most computation for statistical tests is local to the party who provides the data.
References
SHOWING 1-10 OF 30 REFERENCES
Secure Multi-Party Computation
- Computer Science, MathematicsSecure Multi-Party Computation
- 2013
This tutorial provides a comprehensive coverage of SMC techniques, starting from precise definitions and fundamental techniques and includes the-state-of-the-art protocols for oblivious transfer (OT) and OT extension in the presence of semi-honest and malicious users.
A method for obtaining digital signatures and public-key cryptosystems
- Computer Science, MathematicsCACM
- 1983
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important…
Multiparty Computation from Threshold Homomorphic Encryption
- Mathematics, Computer ScienceEUROCRYPT
- 2000
It is shown that given keys for any sufficiently efficient system of this type, general MPC protocols for n parties can be devised which are secure against an active adversary that corrupts any minority of the parties.
The round complexity of secure protocols
- Computer ScienceSTOC '90
- 1990
It is shown that a rigorously-specified and extremely strong notion of secure function evaluation can be achieved by a protocol which requires only a fixed constant number of rounds of interaction, and this result assumes only the existence of a one-way function.
Privacy preserving auctions and mechanism design
- Computer ScienceEC '99
- 1999
An architecture for executing protocols for auctions and, more generally, mechanism design is suggested to preserve the privacy of the inputs of the participants while maintaining communication and computationaliency.
Efficient Multiparty Computations with Dishonest Minority
- Computer Science, Mathematics
- 1998
This paper observes that a subprotocol of Rabin and Ben-Or, known as weak secret sharing (WSS), is not secure against an adaptive adversary, and proposes new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones.
Patient Controlled Encryption: Patient Privacy in Electronic Medical Records
- Computer Science
- 2009
It is shown that a patient Controlled Encryption scheme can be built that allows patients both to share partial access rights with others, and to perform searches over their records, and several instantiations are given, based on existing cryptographic primitives and protocols, each achieving a set of properties.
Protocols for secure computations
- Computer ScienceFOCS 1982
- 1982
The author gives a precise formulation of this general problem and describes three ways of solving it by use of one-way functions, which have applications to secret voting, private querying of database, oblivious negotiation, playing mental poker, etc.
Blind Signatures for Untraceable Payments
- Computer ScienceCRYPTO
- 1982
Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers. The ultimate structure of the…
The Theory and Implementation of an Electronic Voting System
- Computer Science, MathematicsSecure Electronic Voting
- 2003
Efficient honest verifier zero-knowledge proofs are presented that make the messages in the voting scheme shorter and easier to compute and verify, for voters as well as authorities, than in currently known schemes.