Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Statically store computational security parameter #222

Open
jot2re opened this issue Jan 17, 2018 · 3 comments
Open

Statically store computational security parameter #222

jot2re opened this issue Jan 17, 2018 · 3 comments
Labels
Status: Pending Issues not currently being solved. Type: Enhancement New functionality related issues.

Comments

@jot2re
Copy link
Collaborator

jot2re commented Jan 17, 2018

We are currently passing around many security parameters. Of these, one specific is a symmetric crypto security parameter. However, this parameter should be directly defined by the concrete encryption/hash functions used. I think it would be better to remove this as a parameter and let it be located as a final variable with the hash/encryption objects used instead.

@jot2re jot2re added the Type: Enhancement New functionality related issues. label Jan 17, 2018
@GuutBoy GuutBoy added the Status: Pending Issues not currently being solved. label Feb 7, 2018
@jot2re
Copy link
Collaborator Author

jot2re commented Nov 22, 2022

This can be implemented with a global static and final hash map where variables can be added and accesses on demand

@jot2re
Copy link
Collaborator Author

jot2re commented Nov 22, 2022

Many SPDZ and SPDZ2k subprotocols require a statistical security parameter. Currently it is set statically in BasicNumericContext. However, we want to handle this in a nice way. It should instead be on the resource pool where it can be loaded either from a command line argument, or file, or as a fall-back a default value (e.g. 40 or 60).

@jot2re
Copy link
Collaborator Author

jot2re commented Nov 22, 2022

This should ideally be handled by a class which sets up the default values, and sanity checks when new values are added. E.g. as is needed in #288

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Status: Pending Issues not currently being solved. Type: Enhancement New functionality related issues.
Projects
None yet
Development

No branches or pull requests

2 participants