{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T03:16:43Z","timestamp":1758079003153,"version":"3.44.0"},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"12","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2025,8]]},"abstract":"<jats:p>There is growing interest in Secure Collaborative Analytics, but fully oblivious query execution in Secure Multi-Party Computation (MPC) settings is prohibitively expensive. Recent related works proposed different approaches to trimming the size of intermediate results between oblivious query operators, resulting in significant speedups at the cost of some controlled information leakage. In Reflex, we generalize these ideas into a flexible and efficient trimming method for the output of the oblivious operators, that we call Resizer. Resizers can be seamlessly integrated between MPC-based query operators. This allows for precisely controlling the security\/performance trade-off on a per-operator and per-query basis. Our method has the potential to accelerate the performance of current oblivious query execution by up to 200 times compared to fully oblivious query execution, and by approximately 7 times compared to existing approaches with the same security guarantees. Our work lays down the foundation for a future MPC query planner that can pick different performance and security targets when composing physical plans.<\/jats:p>\n          <jats:p>This demonstration showcases the benefits of Reflex. More precisely, it focuses on the integration of our proposed resizers into the oblivious query plan, significantly enhancing performance. Conference attendees will have the opportunity to observe the efficient trimming of intermediate results and, additionally, they will be able to configure the oblivious execution settings, ranging from fully oblivious to fully revealed. This hands-on experience will highlight the benefits of our proposal in various obliviousness scenarios.<\/jats:p>","DOI":"10.14778\/3750601.3750659","type":"journal-article","created":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T13:38:05Z","timestamp":1758029885000},"page":"5311-5314","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["How SMPC Query Execution Can be Sped Up through Efficient and Flexible Intermediate Result Size Trimming"],"prefix":"10.14778","volume":"18","author":[{"given":"Long","family":"Gu","sequence":"first","affiliation":[{"name":"Systems Group, TU Darmstadt, Germany"}]},{"given":"Shaza","family":"Zeitouni","sequence":"additional","affiliation":[{"name":"Systems Group, TU Darmstadt, Germany"}]},{"given":"Carsten","family":"Binnig","sequence":"additional","affiliation":[{"name":"Systems Group, TU Darmstadt, Germany"}]},{"given":"Zsolt","family":"Istv\u00e1n","sequence":"additional","affiliation":[{"name":"Systems Group, TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,9,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_2_1_2_1","volume-title":"SMCQL: Secure Querying for Federated Databases.","author":"Bater Johes","year":"2016","unstructured":"Johes Bater, Gregory Elliott, Craig Eggen, Satyender Goel, Abel Kho, and Jennie Rogers. 2016. SMCQL: Secure Querying for Federated Databases."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/3291264.3291274"},{"key":"e_1_2_1_4_1","volume-title":"Clarion: Anonymous communication from multiparty shuffling protocols. Cryptology ePrint Archive","author":"Eskandarian Saba","year":"2021","unstructured":"Saba Eskandarian and Dan Boneh. 2021. Clarion: Anonymous communication from multiparty shuffling protocols. Cryptology ePrint Archive (2021)."},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Wenjing Fang Shunde Cao Guojin Hua Junming Ma Yongqiang Yu Qunshan Huang Jun Feng Jin Tan Xiaopeng Zan Pu Duan et al. 2024. SecretFlow-SCQL: A Secure Collaborative Query pLatform. (2024).","DOI":"10.14778\/3685800.3685821"},{"key":"e_1_2_1_6_1","volume-title":"General data protection regulation. Regulation (EU) 2016\/679 of the European Parliament and of the Council of","author":"Protection General Data","year":"2016","unstructured":"General Data Protection Regulation GDPR. 2016. General data protection regulation. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (2016)."},{"key":"e_1_2_1_7_1","volume-title":"Reflex: Speeding Up SMPC Query Execution through Efficient and Flexible Intermediate Result Size Trimming. arXiv:2503.20932 [cs.DB] https:\/\/arxiv.org\/abs\/2503.20932","author":"Gu Long","year":"2025","unstructured":"Long Gu, Shaza Zeitouni, Carsten Binnig, and Zsolt Istv\u00e1n. 2025. Reflex: Speeding Up SMPC Query Execution through Efficient and Flexible Intermediate Result Size Trimming. arXiv:2503.20932 [cs.DB] https:\/\/arxiv.org\/abs\/2503.20932"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_2_1_9_1","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Liagouris John","year":"2023","unstructured":"John Liagouris, Vasiliki Kalavri, Muhammad Faisal, and Mayank Varia. 2023. {SECRECY}: Secure collaborative analytics in untrusted clouds. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). 1031\u20131056."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303982"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3750601.3750659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T13:44:15Z","timestamp":1758030255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3750601.3750659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8]]},"references-count":10,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["10.14778\/3750601.3750659"],"URL":"https:\/\/doi.org\/10.14778\/3750601.3750659","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2025,8]]},"assertion":[{"value":"2025-09-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}