Mitigating Information Leakage Risks in Secure Multiparty Computation through Function Hiding
Published: 2026
Abstract
Secure multiparty computation (SMPC) allows a joint computation on private data, but the majority of the existing protocols assume implicitly that the computation being performed is public and non-sensitive. In practice, though, computation logic frequently incorporates proprietary strategy or sensitive rule of decision, and its exposures constitute a significant though neglected leak of information. The prevailing SMPC models can mainly provide input confidentiality and accuracy, but the protocol level leakage due to observable protocol behavior is not well tackled. This paper attempts to fill this gap by introducing a (Function-Hiding Secure Multiparty Computation) FH-SMPC framework modifying the SMPC workflow to incorporate encapsulation of functions and regular patterns of execution directly. The suggested design hides structural and semantic attributes of the considered function and maintains the correctness, scalability, and compatibility with the conventional SMPC primitives. An explicit security analysis provides indistinguishability of functions along with classical input privacy. Experimental evaluation shows that FH-SMPC reduces transcript-based function distinguishability by over 85%, achieving an average divergence of 0.028 compared to 0.214 for baseline SMPC, with an execution latency increase limited to approximately 12% and no asymptotic growth in communication overhead. By treating computation logic as a confidential asset, FH-SMPC advances secure collaborative computation and provides a practical foundation for privacy-sensitive applications in cloud analytics and distributed decision systems.
Keywords
Mitigating Information Leakage Risks in Secure Multiparty Computation through Function Hiding is licensed under CC BY 4.0
References
- . S. R. H. Najarkolaei, M. M. Mojahedian, and M. R. Aref, “Beyond Yao’s Millionaires: Secure Multi-Party Computation of Non-Polynomial Functions,” Oct. 2024, doi: 10.48550/arxiv.2410.17000.
- . C. Wang et al., “TSS-ZKP: Enabling Blockchain Account Supervision Without Compromising User Identity,” IEEE Internet of Things Journal, doi: 10.1109/jiot.2025.3577616.
- . M. Kumar and B. Mondal, “Quantum Secure Multiparty Computation based on Secure Summation and QKD,” Jul. 2025, doi: 10.21203/rs.3.rs-6706796/v1.
- . S. Tarnopolsky, Zirui, S. Deng, V. Ramkumar, N. Raviv, and A. Cohen, “Individual Confidential Computing of Polynomials over Non-Uniform Information,” Jan. 2025, doi: 10.48550/arxiv.2501.15645.
- . Aslam, W. Tariq, T. Waheed, K. Hamid, S. Rizwan, and A. Ahmed, “Enhancing Privacy and Security in Multi-Party Computation for Data Mining in Cryptographically Protected Environments,” vol. 3, no. 8, pp. 510–531, Aug. 2025, doi: 10.63075/fxe5gg65.
- . X. Liu et al., “HE/MPC-Based Scheme for Secure Computing LCM/GCD and Its Application to Federated Learning,” Symmetry, vol. 17, no. 7, p. 1151, Jul. 2025, doi: 10.3390/sym17071151.
- . C. Hazay, M. Venkitasubramaniam, and M. Weiss, “Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more,” Journal of Cryptology, vol. 38, no. 1, Oct. 2024, doi: 10.1007/s00145-024-09524-3.
- . S. Begum and S. Sultana, “Anonymous data leakage-resilient in multi-receiver hybrid data encryption in public key system,” vol. 21, no. 3 (1), pp. 1516–1522, Aug. 2025, doi: 10.62643/ijerst.v21.n3(1).pp1516-1522.
- . R. R. Cohen, J. Doerner, Y. Kondi, and A. Shelat, “Secure Multiparty Computation with Identifiable Abort via Vindicating Release,” pp. 36–73, doi: 10.1007/978-3-031-68397-8_2.
- . Q. Deng, L. Chen, and Y. Mu, “Leakage Reduced Searchable Symmetric Encryption for Multi-keyword Queries,” IEEE Transactions on Cloud Computing, doi: 10.1109/tcc.2025.3573378.
- . H. Chen, J. Li, and L. F. Zhang, “A Multi-Server Publicly Verifiable Computation Scheme with Context-Hiding Property,” pp. 1860–1865, Jul. 2024, doi: 10.1109/isit57864.2024.10619256.
- . Q. Gao, D. Lu, D. Wen, S. Renqian, and X. Wei, “Multi-party verifiable arbitrated quantum signature scheme with information hiding function,” Laser Physics Letters, vol. 22, no. 8, p. 085202, Jul. 2025, doi: 10.1088/1612-202x/adf395.
- . S. K. Dixit, A. Ramamoorthy, and K. Anusha, “Neural Cryptographic Protocols Using Secure Multi-Party Computation (SMPC) for Encrypted Data Processing in AI-Driven Security System,” pp. 519–549, Mar. 2025, doi: 10.71443/9789349552029-17.
- . M. Thomas, L. Choudhary, Analysis of cloud security and performance for leakage of critical information using DROPS methodology, International Research Journal of Engineering and Technology (IRJET), vol. 7, no. 2, pp. 103–105, Feb. 2020. [Online]. Available: www.irjet.net
- . G. Zhao, W. Tan, and C. Peng, “An Attribute-Based Proxy Re-Encryption Scheme Supporting Revocable Access Control,” Electronics, vol. 14, no. 15, p. 2988, Jul. 2025, doi: 10.3390/electronics14152988.
- . Q. Ye and B. Delaware, “Taypsi: Static Enforcement of Privacy Policies for Policy-Agnostic Oblivious Computation,” Proceedings of the ACM on programming languages, vol. 8, no. OOPSLA1, pp. 1407–1436, Apr. 2024, doi: 10.1145/3649861.
- . N. K. Rathi, “Beyond Encryption: A Holistic Approach to Privacy-Preserving Query Processing in Modern Database Systems,” Indian Scientific Journal Of Research In Engineering And Management, vol. 09, no. 06, pp. 1–9, Jun. 2025, doi: 10.55041/ijsrem49974.
- . A. Syed, “AI-powered genomic risk prediction and personalized drug recommendations using transformers,” in Transformative Role of Transformer Models in Healthcare, © 2026, pp. 32, doi: 10.4018/979-8-3373-2038-0.ch010.
- . M. Xu et al., “Sectric: Towards Accurate, Privacy-Preserving and Efficient Triangle Counting,” Proceedings of The Vldb Endowment, vol. 18, no. 10, pp. 3382–3395, Jun. 2025, doi: 10.14778/3748191.3748202.
- . Y. Li, J. Wei, F. Guo, Y. Xiang, and X. Chen, “Function-Hiding Multi-Client Inner-Product Functional Encryption Without Pairings for Large Space,” IEEE Transactions on Dependable and Secure Computing, doi: 10.1109/tdsc.2025.3576164.
- . H. Choi, “PP-STAT: An Efficient Privacy-Preserving Statistical Analysis Framework using Homomorphic Encryption,” Aug. 2025, doi: 10.1145/3746252.3761194.
- . V. R. Cadambe, H. Jeong, and F. P. Calmon, “Differentially Private Secure Multiplication: Hiding Information in the Rubble of Noise,” pp. 2207–2212, Jun. 2023, doi: 10.1109/isit54713.2023.10206949.
- . B. Han et al., “PBFL: A Privacy-Preserving Blockchain-Based Federated Learning Framework With Homomorphic Encryption and Single Masking,” IEEE Internet of Things Journal, p. 1, Jan. 2025, doi: 10.1109/jiot.2024.3524632.
- . Y. Chen, N. Ding, D. Gu, and Y. Bian, “Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion1,” Journal of Computer Security, Apr. 2024, doi: 10.3233/jcs-230091.
- . M. Vijaya and L. S. Chakravarthy, “SECUREDGE: Privacy-Preserving Deduplication with Homomorphic Encryption for Multi-Tenant Cloud Systems,” International Journal of Basic and Applied Sciences, vol. 14, no. 3, pp. 242–257, Jul. 2025, doi: 10.14419/6ekp0r85.
- . J. Zhang et al., “A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem,” Symmetry, vol. 15, no. 2, p. 319, Jan. 2023, doi: 10.3390/sym15020319.
- . F. Falzon and E. A. Markatou, “Re-visiting Authorized Private Set Intersection: A New Privacy-Preserving Variant and Two Protocols,” IACR Cryptology ePrint Archive, vol. 2024, p. 1579, Jan. 2025, doi: 10.56553/popets-2025-0041.
- . Y. Luo, Y. Chen, T. Li, C. J. Tan, and H. Dou, “Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption,” Jan. 2024, doi: 10.1186/s13677-023-00586-5.
- . H. Xia and M. Wang, “Efficient and Compact Full-Domain Functional Bootstrapping via Subring Folding,” IACR transactions on cryptographic hardware and embedded systems, vol. 2025, no. 4, pp. 737–762, Sep. 2025, doi: 10.46586/tches.v2025.i4.737-762.
- . Y. Bai, X. Guang, and R. W. Yeung, “Secure Network Function Computation: Function-Security,” pp. 1514–1519, Jul. 2024, doi: 10.1109/isit57864.2024.10619365.
- . X. Kang et al., “Privacy Set Intersection From Oblivious Polynomial Evaluation,” Zhongguo kexue, Aug. 2025, doi: 10.1360/ssi-2025-0184.
- . S. Saeidian, G. Cervia, T. J. Oechtering, and M. Skoglund, “Rethinking Disclosure Prevention with Pointwise Maximal Leakage,” The journal of privacy and confidentiality, vol. 15, no. 1, Mar. 2025, doi: 10.29012/jpc.893.
- . Sweet, D. Darais, D. Heath, W. R. Harris, R. Estes, and M. Hicks, “Symphony: Expressive Secure Multiparty Computation with Coordination,” The art, science, and engineering of programming, vol. 7, no. 3, Feb. 2023, doi: 10.22152/programming-journal.org/2023/7/14.
- . H. S. Jaafar, A. A. Abed, and M. A. Al-Shareeda, “A Secure Industrial Internet of Things (IIoT) Framework for Real-Time PI Control and Cloud-Integrated Industrial Monitoring,” STAP Journal of Security Risk Management, vol. 2026, no. 1, pp. 77–86, 2026, doi: 10.63180/jsrm.thestap.2026.1.5.
- . Alsahaim S, Almaiah MA, Sulaiman RB. Security Threats in Mobile Phones: Challenges, Countermeasures, and the Importance of User Awareness. International Journal of Cybersecurity Engineering and Innovation. 2023 Nov 25;2023(1).
- . K. Audah Kareem and M. A. Al-Shareeda, “A Low-Complexity Li-Fi Communication Framework for Short-Range Text Transmission,” Jordanian Journal of Informatics and Computing, vol. 2026, no. 1, pp. 15–24, 2026, doi: 10.63180/jjic.thestap.2026.1.2.
- . H. S. Jaafar, A. A. Abed, and M. A. Al-Shareeda, “A Secure Industrial Internet of Things (IIoT) Framework for Real-Time PI Control and Cloud-Integrated Industrial Monitoring,” STAP Journal of Security Risk Management, vol. 2026, no. 1, pp. 77–86, 2026, doi: 10.63180/jsrm.thestap.2026.1.5.
- . Alghareeb MS, Almaiah M, Badr Y. Cyber Security Threats in Wireless LAN: A Literature Review. International Journal of Cybersecurity Engineering and Innovation. 2024 Dec 31;2024(1).
- . S. R. Addula, S. Norozpour, and M. Amin, “Risk Assessment for Identifying Threats, vulnerabilities and countermeasures in Cloud Computing,” Jordanian Journal of Informatics and Computing, vol. 2025, no. 1, pp. 38–48, 2025, doi: 10.63180/jjic.thestap.2025.1.5.
- . Alrajeh M, Almaiah M, Mamodiya U. Cyber Risk Analysis and Security Practices in Industrial Manufacturing: Empirical Evidence and Literature Insights. International Journal of Cybersecurity Engineering and Innovation. 2026 Jan 7;2026(1).
- . B. Konda, A. R. Yadulla, V. K. Kasula, M. Yenugula, and S. B. Rakki, “A Quantum-Resistant Privacy-Preserving Framework for Consortium Blockchains Using Blind Signatures, Hierarchical Fully Homomorphic Encryption, and Zero-Knowledge Proofs,” pp. 1–6, Feb. 2025, doi: 10.1109/satc65530.2025.11137073.
- . Bay, “Delegated multi-party private set intersections from extendable output functions,” PeerJ, vol. 11, p. e3141, Aug. 2025, doi: 10.7717/peerj-cs.3141.
- . Yassin A, Almaiah M. Cyber security risk assessment for determining threats and countermeasures for banking systems. International Journal of Cybersecurity Engineering and Innovation. 2026 Jan 9;2026(1).
- . Gruner, C.-A. Brust, and A. Zeller, “Finding Information Leaks with Information Flow Fuzzing - RCR Report,” ACM Transactions on Software Engineering and Methodology, Jan. 2025, doi: 10.1145/3711905.
