MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer

被引:219
作者
Keller, Marcel [1 ]
Orsini, Emmanuela [1 ]
Scholl, Peter [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1TH, Avon, England
来源
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2016年
基金
英国工程与自然科学研究理事会;
关键词
Multi-party computation; oblivious transfer; MULTIPARTY COMPUTATION;
D O I
10.1145/2976749.2978357
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be expressed easily and efficiently. In the strongest setting of malicious security with a dishonest majority where any number of parties may deviate arbitrarily from the protocol - most existing protocols require expensive public-key cryptography for each multiplication in the preprocessing stage of the protocol, which leads to a high total cost. We present a new protocol that overcomes this limitation by using oblivious transfer to perform secure multiplications in general finite fields with reduced communication and computation. Our protocol is based on an arithmetic view of oblivious transfer, with careful consistency checks and other techniques to obtain malicious security at a cost of less than 6 times that of semi-honest security. We describe a highly optimized implementation together with experimental results for up to five parties. By making extensive use of parallelism and SSE instructions, we improve upon previous runtimes for MPC over arithmetic circuits by more than 200 times.
引用
收藏
页码:830 / 842
页数:13
相关论文
共 39 条
  • [11] Burra S. S., 2015, 2015472 CRYPTOLOGY
  • [12] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [13] The Simplest Protocol for Oblivious Transfer
    Chou, Tung
    Orlandi, Claudio
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 40 - 58
  • [14] Damgard Ivan, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P1, DOI 10.1007/978-3-642-40203-6_1
  • [15] Damgard Ivan, 2012, Security and Cryptography for Networks. Proceedings of the 8th International Conference (SCN 2012), P241, DOI 10.1007/978-3-642-32928-9_14
  • [16] Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
  • [17] Damgård I, 2010, LECT NOTES COMPUT SC, V6223, P558
  • [18] Damgard Ivan, 2016, FINANCIAL CRYPTOGRAP
  • [19] A Unified Approach to MPC with Preprocessing Using OT
    Frederiksen, Tore Kasper
    Keller, Marcel
    Orsini, Emmanuela
    Scholl, Peter
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 711 - 735
  • [20] Gilboa N., 1999, Advances in Cryptology - CRYPTO'99. 19th Annual International Cryptology Conference. Proceedings, P116