HyCC: Compilation of Hybrid Protocols for Practical Secure Computation

被引:51
作者
Buescher, Niklas [1 ]
Demmler, Daniel [1 ]
Katzenbeisser, Stefan [1 ]
Kretzmer, David [1 ]
Schneider, Thomas [1 ]
机构
[1] Tech Univ Darmstadt, Darmstadt, Germany
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
关键词
secure multi-party computation; MPC; secure computation; compiler; hybrid protocols; automatization; BOOLEAN CIRCUITS; PRIVACY;
D O I
10.1145/3243734.3243786
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
While secure multi-party computation (MPC) is a vibrant research topic and a multitude of practical MPC applications have been presented recently, their development is still a tedious task that requires expert knowledge. Previous works have made first steps in compiling high-level descriptions from various source descriptions into MPC protocols, but only looked at a limited set of protocols. In this work we present HyCC, a tool-chain for automated compilation of ANSI C programs into hybrid protocols that efficiently and securely combine multiple MPC protocols with optimizing compilation, scheduling, and partitioning. As a result, our compiled protocols are able to achieve performance numbers that are comparable to hand-built solutions. For the MiniONN neural network (Liu et al., CCS 2017), our compiler improves performance of the resulting protocol by more than a factor of 3. Thus, for the first time, highly efficient hybrid MPC becomes accessible for developers without cryptographic background.
引用
收藏
页码:847 / 861
页数:15
相关论文
共 54 条
[1]   Jasmin: High-Assurance and High-Speed Cryptography [J].
Almeida, Jose Bacelar ;
Barbosa, Manuel ;
Barthe, Gilles ;
Blot, Arthur ;
Gregoire, Benjamin ;
Laporte, Vincent ;
Oliveira, Tiago ;
Pacheco, Hugo ;
Schmidt, Benedikt ;
Strub, Pierre-Yves .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1807-1823
[2]  
[Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2508859.2516738
[3]  
[Anonymous], 2011, P US C SEC
[4]  
[Anonymous], 2013, Financial Cryptography and Data Security
[5]  
[Anonymous], 2015, NDSS 2015
[6]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[7]  
Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
[8]  
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[9]   Efficient Garbling from a Fixed-Key Blockcipher [J].
Bellare, Mihir ;
Viet Tung Hoang ;
Keelveedhi, Sriram ;
Rogaway, Phillip .
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2013, :478-492
[10]   How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation [J].
Bogdanov, Dan ;
Joemets, Marko ;
Siim, Sander ;
Vaht, Meril .
Financial Cryptography and Data Security (FC 2015), 2015, 8975 :227-234