Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation

被引:53
作者
Boyle, Elette [1 ]
Gilboa, Niv [2 ]
Ishai, Yuval [3 ,4 ]
机构
[1] IDC Herzliya, Herzliyya, Israel
[2] Ben Gurion Univ Negev, Beer Sheva, Israel
[3] Technion, Haifa, Israel
[4] Univ Calif Los Angeles, Haifa, Israel
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II | 2017年 / 10211卷
基金
欧洲研究理事会; 美国国家科学基金会;
关键词
RANDOMIZING POLYNOMIALS; MULTIPARTY COMPUTATION; ENCRYPTION;
D O I
10.1007/978-3-319-56614-6_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A recent work of Boyle et al. (Crypto 2016) suggests that "group-based" cryptographic protocols, namely ones that only rely on a cryptographically hard (Abelian) group, can be surprisingly powerful. In particular, they present succinct two-party protocols for securely computing branching programs and NC1 circuits under the DDH assumption, providing the first alternative to fully homomorphic encryption. In this work we further explore the power of group-based secure computation protocols, improving both their asymptotic and concrete efficiency. We obtain the following results. Black-box use of group. We modify the succinct protocols of Boyle et al. so that they only make a black-box use of the underlying group, eliminating an expensive non-black-box setup phase. Round complexity. For any constant number of parties, we obtain 2-round MPC protocols based on a PKI setup under the DDH assumption. Prior to our work, such protocols were only known using fully homomorphic encryption or indistinguishability obfuscation. Communication complexity. Under DDH, we present a secure 2-party protocol for any NC1 or log-space computation with n input bits and m output bits using n + (1 + o(1)) m + poly(lambda) bits of communication, where lambda is a security parameter. In particular, our protocol can generate n instances of bit-oblivious-transfer using (4 + o(1)) . n bits of communication. This gives the first constant-rate OT protocol under DDH. Computation complexity. We present several techniques for improving the computational cost of the share conversion procedure of Boyle et al., improving the concrete efficiency of group-based protocols by several orders of magnitude.
引用
收藏
页码:163 / 193
页数:31
相关论文
共 38 条
  • [1] [Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
  • [2] [Anonymous], 1978, FDN SEC COMPUT
  • [3] Computationally private randomizing polynomials and their applications
    Applebaum, B
    Ishai, Y
    Kushilevitz, E
    [J]. TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2005, : 260 - 274
  • [4] Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
  • [5] BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
  • [6] Boneh D, 2008, LECT NOTES COMPUT SC, V5157, P108, DOI 10.1007/978-3-540-85174-5_7
  • [7] Boneh D, 2013, LECT NOTES COMPUT SC, V8270, P280, DOI 10.1007/978-3-642-42045-0_15
  • [8] Selecting elliptic curves for cryptography: an efficiency and security analysis
    Bos, Joppe W.
    Costello, Craig
    Longa, Patrick
    Naehrig, Michael
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (04) : 259 - 286
  • [9] Breaking the Circuit Size Barrier for Secure Computation Under DDH
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 509 - 539
  • [10] Function Secret Sharing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 : 337 - 367