MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer

被引:219
作者
Keller, Marcel [1 ]
Orsini, Emmanuela [1 ]
Scholl, Peter [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1TH, Avon, England
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
基金
英国工程与自然科学研究理事会;
关键词
Multi-party computation; oblivious transfer; MULTIPARTY COMPUTATION;
D O I
10.1145/2976749.2978357
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be expressed easily and efficiently. In the strongest setting of malicious security with a dishonest majority where any number of parties may deviate arbitrarily from the protocol - most existing protocols require expensive public-key cryptography for each multiplication in the preprocessing stage of the protocol, which leads to a high total cost. We present a new protocol that overcomes this limitation by using oblivious transfer to perform secure multiplications in general finite fields with reduced communication and computation. Our protocol is based on an arithmetic view of oblivious transfer, with careful consistency checks and other techniques to obtain malicious security at a cost of less than 6 times that of semi-honest security. We describe a highly optimized implementation together with experimental results for up to five parties. By making extensive use of parallelism and SSE instructions, we improve upon previous runtimes for MPC over arithmetic circuits by more than 200 times.
引用
收藏
页码:830 / 842
页数:13
相关论文
共 39 条
  • [1] [Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
  • [2] [Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2508859.2516738
  • [3] [Anonymous], 2015, 22 ANN NETW DISTR SY
  • [4] Baum C., 2016, IACR CRYPTOLOGY EPRI
  • [5] Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
  • [6] Beaver D., 1992, ADV CRYPTOLOGY CRYPT
  • [7] Bendlin R, 2011, LECT NOTES COMPUT SC, V6632, P169, DOI 10.1007/978-3-642-20465-4_11
  • [8] An Analysis of the Blockcipher-Based Hash Functions from PGV
    Black, J.
    Rogaway, P.
    Shrimpton, T.
    Stam, M.
    [J]. JOURNAL OF CRYPTOLOGY, 2010, 23 (04) : 519 - 545
  • [9] Bogdanov D., 2015, IACR CRYPTOLOGY EPRI
  • [10] How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation
    Bogdanov, Dan
    Joemets, Marko
    Siim, Sander
    Vaht, Meril
    [J]. Financial Cryptography and Data Security (FC 2015), 2015, 8975 : 227 - 234