{
    "version" : "https://jsonfeed.org/version/1",
    "content" : "resources",
    "type" : "single",
    "title" : "Privacy-Preserving Collaboration Using Cryptography |Digital.gov",
    "description": "Privacy-Preserving Collaboration Using Cryptography",
    "home_page_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/","feed_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/privacy-preserving-collaboration-using-cryptography/index.json","item" : [
    {"title" :"Privacy-Preserving Collaboration Using Cryptography","summary" : "In conjunction with her May 2020 presentation, Dr. Emily Shen outlines her work on Secure multi-party computation (MPC), a type of cryptography that allows parties to jointly analyze their data without disclosing it.","date" : "2020-09-29T13:53:00-05:00","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"dr-emily-shen" : "Dr. Emily Shen"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"privacy-preserving-collaboration-using-cryptography.md",
      
      "filepath" :"resources/privacy-preserving-collaboration-using-cryptography.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/privacy-preserving-collaboration-using-cryptography.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/privacy-preserving-collaboration-using-cryptography.md","slug" : "privacy-preserving-collaboration-using-cryptography","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/privacy-preserving-collaboration-using-cryptography/","weight" : "1","content" :"\u003cp\u003eFor many applications, organizations want to collaborate to gain insights from their collective data but can’t share their data due to security and privacy concerns. These needs arise within government (e.g., intelligence sharing), between government and industry (e.g., cyber threat sharing), and between governments (e.g., coordination with coalition partners).\u003c/p\u003e\n\u003cp\u003eToday, to analyze their collective data, organizations must share their data – either with each other or with a third party – and trust those other parties with their sensitive data. Traditionally, collaboration on sensitive data incurs significant security and privacy risks, or does not take place at all. Ideally, organizations could obtain the results and benefits of data sharing without actually sharing their private data.\u003c/p\u003e\n\u003cp\u003eThe need for technology to address these problems has been recognized at the national level. For example, in \u003ca href=\"https://digital.library.unt.edu/ark:/67531/metadc1282027/\"\u003e2017 the Report of the U.S. Commission on Evidence-Based Policymaking\u003c/a\u003e recommended improving how the government uses and protects data by adopting privacy-preserving technologies, such as secure multi-party computation.\u003c/p\u003e\n\u003ch2 id=\"secure-multi-party-computation-mpc\"\u003eSecure Multi-Party Computation (MPC)\u003c/h2\u003e\n\u003cp\u003e\u003ca href=\"https://en.wikipedia.org/wiki/Secure_multi-party_computation\"\u003eSecure multi-party computation\u003c/a\u003e (MPC) is a type of cryptography that allows parties to jointly analyze their data without giving their data to each other and without using a trusted third party. MPC guarantees that no party learns anything other than the result of the computation. By eliminating the need for a trusted party, MPC avoids the security and privacy risks of traditional approaches to collaborating on sensitive data. In this way, MPC enables new types of collaboration that are currently restricted because the data is too sensitive to share.\u003c/p\u003e\n\u003cp\u003eMPC protocols have existed since the 1980s that can in theory be used to securely perform any computation. In recent years, MPC protocols have been implemented, improved, and shown to be practical for many applications. However, it remains challenging to develop and optimize MPC for complex functions.\u003c/p\u003e\n\u003ch2 id=\"rapid-assembly-of-mpc-protocols-ramp\"\u003eRapid Assembly of MPC Protocols (RAMP)\u003c/h2\u003e\n\u003cp\u003eTo address these challenges, \u003ca href=\"https://www.ll.mit.edu/\"\u003eMIT Lincoln Laboratory\u003c/a\u003e has developed a software framework called Rapid Assembly of MPC Protocols (RAMP) that enables researchers to quickly prototype and evaluate MPC solutions. RAMP allows MPC applications to be developed by composing layers of gadgets – secure protocols for common computational building blocks, like comparing two numbers or sorting a list of numbers. MPC gadgets are in turn built on top of primitives – secure protocols for low-level operations, like addition and multiplication. RAMP also includes tools for evaluating the performance of MPC applications and building blocks.\u003c/p\u003e\n\u003cp\u003eMIT Lincoln Laboratory has used the RAMP framework to develop MPC for privacy-preserving collaboration in cyber security and other application areas. For the \u003ca href=\"https://www.dhs.gov/science-and-technology/federated-security\"\u003eDHS S\u0026amp;T Federated Security\u003c/a\u003e program, MIT Lincoln Laboratory built MPC to securely compute statistics and set operations on items such as IP addresses and vulnerabilities. They also integrated several of these applications into a federated command and control infrastructure.\u003c/p\u003e\n\u003cp\u003eFor the \u003ca href=\"https://www.darpa.mil/program/brandeis\"\u003eDARPA Brandeis program\u003c/a\u003e, MIT Lincoln Laboratory also prototyped MPC for network defense analytics to allow organizations to perform distributed threat detection. In ongoing and future work, MIT Lincoln Laboratory is leveraging the RAMP framework to develop MPC solutions for new use cases and mission areas and plans to open-source the framework.\u003c/p\u003e\n\u003cp\u003eFor more information, please \u003ca href=\"https://digital.gov/event/2020/05/05/dr-emily-shen-on-secure/\"\u003ewatch Dr. Emily Shen\u0026rsquo;s May 2020 presentation here on Digital.gov\u003c/a\u003e.\u003c/p\u003e\n"}
  ]
}
