Research

Paper

TESTING March 20, 2026

Sharing The Secret: Distributed Privacy-Preserving Monitoring

Authors

Mahyar Karimi, K. S. Thejaswini, Roderick Bloem, Thomas A. Henzinger

Abstract

In traditional runtime verification, a system is typically observed by a monolithic monitor. Enforcing privacy in such settings is computationally expensive, as it necessitates heavy cryptographic primitives. Therefore, privacy-preserving monitoring remains impractical for real-time applications. In this work, we address this scalability challenge by distributing the monitor across multiple parties -- at least one of which is honest. This architecture enables the use of efficient secret-sharing schemes instead of computationally intensive cryptography, dramatically reducing over-head while maintaining strong privacy guarantees. While existing secret-sharing approaches are typically limited to one-shot executions which do not maintain an internal state, we introduce a protocol tailored for continuous monitoring that supports repeated evaluations over an evolving internal state (kept secret from the system and the monitoring entities). We implement our approach using the MP-SPDZ framework. Our experiments demonstrate that, under these architectural assumptions, our protocol is significantly more scalable than existing alternatives.

Metadata

arXiv ID: 2603.20107
Provider: ARXIV
Primary Category: cs.CR
Published: 2026-03-20
Fetched: 2026-03-23 16:54

Related papers

Raw Data (Debug)
{
  "raw_xml": "<entry>\n    <id>http://arxiv.org/abs/2603.20107v1</id>\n    <title>Sharing The Secret: Distributed Privacy-Preserving Monitoring</title>\n    <updated>2026-03-20T16:30:57Z</updated>\n    <link href='https://arxiv.org/abs/2603.20107v1' rel='alternate' type='text/html'/>\n    <link href='https://arxiv.org/pdf/2603.20107v1' rel='related' title='pdf' type='application/pdf'/>\n    <summary>In traditional runtime verification, a system is typically observed by a monolithic monitor. Enforcing privacy in such settings is computationally expensive, as it necessitates heavy cryptographic primitives. Therefore, privacy-preserving monitoring remains impractical for real-time applications. In this work, we address this scalability challenge by distributing the monitor across multiple parties -- at least one of which is honest. This architecture enables the use of efficient secret-sharing schemes instead of computationally intensive cryptography, dramatically reducing over-head while maintaining strong privacy guarantees. While existing secret-sharing approaches are typically limited to one-shot executions which do not maintain an internal state, we introduce a protocol tailored for continuous monitoring that supports repeated evaluations over an evolving internal state (kept secret from the system and the monitoring entities). We implement our approach using the MP-SPDZ framework. Our experiments demonstrate that, under these architectural assumptions, our protocol is significantly more scalable than existing alternatives.</summary>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.CR'/>\n    <category scheme='http://arxiv.org/schemas/atom' term='cs.FL'/>\n    <published>2026-03-20T16:30:57Z</published>\n    <arxiv:comment>29 pages, 1 figure</arxiv:comment>\n    <arxiv:primary_category term='cs.CR'/>\n    <author>\n      <name>Mahyar Karimi</name>\n    </author>\n    <author>\n      <name>K. S. Thejaswini</name>\n    </author>\n    <author>\n      <name>Roderick Bloem</name>\n    </author>\n    <author>\n      <name>Thomas A. Henzinger</name>\n    </author>\n  </entry>"
}