Security News > 2022 > May > How to eliminate the weak link in public cloud-based multi-party computation

How to eliminate the weak link in public cloud-based multi-party computation
2022-05-27 04:00

Regardless of how centralized or distributed, the weak link appears when private keys or other MPC components must be computationally executed on a CPU. The point of the encryption protocols is that the algorithm is public, and the security relies only on the keys.

If an attacker infiltrates multiple hosts, and gains access to the required pieces, they can perform the multi-party computation on their own and steal digital assets and funds.

Attackers have the potential to observe computation, capturing keys and interfering with transactions.

These attackers may be rogue insiders, third-party contractors or attackers that have gained root access to servers.

Sometimes access can come through an insecure software component in cloud or application infrastructure, which can then be used by an external attacker or insider.

Private keys can be made totally opaque to attackers.


News URL

https://www.helpnetsecurity.com/2022/05/27/multi-party-computation/