Privacy-Preserving Methods for Sharing Financial Risk Exposures

@article{Abbe2011PrivacyPreservingMF,
  title={Privacy-Preserving Methods for Sharing Financial Risk Exposures},
  author={Emmanuel Abbe and Amir Ehsan Khandani and Andrew W. Lo},
  journal={ERN: Pricing (Topic)},
  year={2011}
}
Unlike other industries in which intellectual property is patentable, the financial industry relies on trade secrecy to protect its business processes and methods, which can obscure critical financial risk exposures from regulators and the public. We develop methods for sharing and aggregating such risk exposures that protect the privacy of all parties involved and without the need for a trusted third party. Our approach employs secure multi-party computation techniques from cryptography in… 
Investcoin: A System for Privacy-Preserving Investments
TLDR
A new framework for Privacy-Preserving Investment systems in a distributed model, independent investors can transfer funds to independent projects, and a simple decentralised key generation protocol for Investcoin supporting dynamic join/leave and fault-tolarance of investors and moreover achieves some security guarantees against malicious investors.
A Distributed Investment Encryption Scheme: Investcoin
TLDR
A simple decentralised key generation protocol for Investcoin is provided that supports dynamic join, leave and fault-tolarance of investors and moreover achieves some security guarantees against malicious investors.
Cryptography and the Economics of Supervisory Information: Balancing Transparency and Confidentiality
We elucidate the tradeoffs between transparency and confidentiality in the context of financial regulation. The structure of information in financial contexts creates incentives with a pervasive
Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
TLDR
Senate is presented, a system that allows multiple parties to collaboratively run analytical SQL queries without revealing their individual data to each other, and provides a new query planning algorithm that decomposes and plans the cryptographic computation effectively.
Computing Statistics from Private Data
TLDR
The primary goals of this work are to describe the computational needs of these disciplines and to develop a specific roadmap for selecting efficient algorithms and protocols that can be used as a starting point for interdisciplinary projects between cryptographers and data scientists.
A Privacy Preserving Approach to Collaborative Systemic Risk Identification: The Use-Case of Supply Chain Networks
TLDR
The paper proposes to combine secure multiparty computation cryptography methods with risk identification algorithms from social network analysis to address structural risk identification of supply chain networks without endangering firms’ competitive advantage.
Secure Multi-party Differential Privacy
TLDR
This work studies the problem of interactive function computation by multiple parties, each possessing a bit, in a differential privacy setting, and finds the optimality of a simple non-interactive protocol: each party randomizes its bit (sufficiently) and shares the privatized version with the other parties.
Compute Globally, Act Locally: Protecting Federated Systems from Systemic Threats
TLDR
This paper argues that the impending crisis could have been predicted by performing a specific distributed computation on the financial information of each bank, but that existing tools do not offer enough privacy to make participation safe from the banks' perspective and sketches the design of a system that can perform this computation at scale with strong privacy guarantees.
Private Liquidity Matching using MPC
TLDR
A privacy-preserving netting protocol to solve the gridlock resolution problem in such Real Time Gross Settlement systems and is implemented in the SCALE MAMBA system, using Shamir secret sharing scheme over three parties in an actively secure manner.
HOLMES: A Platform for Detecting Malicious Inputs in Secure Collaborative Computation
TLDR
HOLMES is presented, a platform for expressing and performing statistical tests securely and efficiently and blends together zero-knowledge proofs (ZK) and SMPC protocols, based on the insight that most computation for statistical tests is local to the party who provides the data.
...
...

References

SHOWING 1-10 OF 30 REFERENCES
Secure Multi-Party Computation
TLDR
This tutorial provides a comprehensive coverage of SMC techniques, starting from precise definitions and fundamental techniques and includes the-state-of-the-art protocols for oblivious transfer (OT) and OT extension in the presence of semi-honest and malicious users.
A method for obtaining digital signatures and public-key cryptosystems
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important
Multiparty Computation from Threshold Homomorphic Encryption
TLDR
It is shown that given keys for any sufficiently efficient system of this type, general MPC protocols for n parties can be devised which are secure against an active adversary that corrupts any minority of the parties.
The round complexity of secure protocols
TLDR
It is shown that a rigorously-specified and extremely strong notion of secure function evaluation can be achieved by a protocol which requires only a fixed constant number of rounds of interaction, and this result assumes only the existence of a one-way function.
Privacy preserving auctions and mechanism design
TLDR
An architecture for executing protocols for auctions and, more generally, mechanism design is suggested to preserve the privacy of the inputs of the participants while maintaining communication and computationaliency.
Efficient Multiparty Computations with Dishonest Minority
TLDR
This paper observes that a subprotocol of Rabin and Ben-Or, known as weak secret sharing (WSS), is not secure against an adaptive adversary, and proposes new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones.
Patient Controlled Encryption: Patient Privacy in Electronic Medical Records
TLDR
It is shown that a patient Controlled Encryption scheme can be built that allows patients both to share partial access rights with others, and to perform searches over their records, and several instantiations are given, based on existing cryptographic primitives and protocols, each achieving a set of properties.
Protocols for secure computations
  • A. Yao
  • Computer Science
    FOCS 1982
  • 1982
TLDR
The author gives a precise formulation of this general problem and describes three ways of solving it by use of one-way functions, which have applications to secret voting, private querying of database, oblivious negotiation, playing mental poker, etc.
Blind Signatures for Untraceable Payments
Automation of the way we pay for goods and services is already underway, as can be seen by the variety and growth of electronic banking services available to consumers. The ultimate structure of the
The Theory and Implementation of an Electronic Voting System
TLDR
Efficient honest verifier zero-knowledge proofs are presented that make the messages in the voting scheme shorter and easier to compute and verify, for voters as well as authorities, than in currently known schemes.
...
...