Fast Large-Scale Honest-Majority MPC for Malicious Adversaries

被引:105
作者
Chida, Koji [1 ]
Genkin, Daniel [2 ]
Hamada, Koki [1 ]
Ikarashi, Dai [1 ]
Kikuchi, Ryo [1 ]
Lindell, Yehuda [3 ]
Nof, Arid [3 ]
机构
[1] NTT Secure Platform Labs, Tokyo, Japan
[2] Univ Michigan, Ann Arbor, MI 48109 USA
[3] Bar Ilan Univ, Ramat Gan, Israel
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III | 2018年 / 10993卷
基金
欧洲研究理事会;
关键词
MULTIPARTY COMPUTATION; SECURITY; SHARE;
D O I
10.1007/978-3-319-96878-0_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocols for secure multiparty computation enable a set of parties to compute a function of their inputs without revealing anything but the output. The security properties of the protocol must be preserved in the presence of adversarial behavior. The two classic adversary models considered are semi-honest (where the adversary follows the protocol specification but tries to learn more than allowed by examining the protocol transcript) and malicious (where the adversary may follow any arbitrary attack strategy). Protocols for semi-honest adversaries are often far more efficient, but in many cases the security guarantees are not strong enough. In this paper, we present new protocols for securely computing any functionality represented by an arithmetic circuit. We utilize a new method for verifying that the adversary does not cheat, that yields a cost of just twice that of semi-honest protocols in some settings. Our protocols are information-theoretically secure in the presence of a malicious adversaries, assuming an honest majority. We present protocol variants for small and large fields, and show how to efficiently instantiate them based on replicated secret sharing and Shamir sharing. As with previous works in this area aiming to achieve high efficiency, our protocol is secure with abort and does not achieve fairness, meaning that the adversary may receive output while the honest parties do not. We implemented our protocol and ran experiments for different numbers of parties, different network configurations and different circuit depths. Our protocol significantly outperforms the previous best for this setting (Lindell and Nof, CCS 2017); for a large number of parties, our implementation runs almost an order of magnitude faster than theirs.
引用
收藏
页码:34 / 64
页数:31
相关论文
共 26 条
[1]  
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[2]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[3]  
ARAKI T, 2017, IEEE S P
[4]   High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority [J].
Araki, Toshinori ;
Furukawa, Jun ;
Lindell, Yehuda ;
Nof, Ariel ;
Ohara, Kazuma .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :805-817
[5]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P377
[6]  
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[7]  
BENOR M, 1988, 20 STOC
[8]  
Burra S.S., 2015, 2015472 EPRINT CRYPT, V2015, P472
[9]   Security and composition of multiparty cryptographic protocols [J].
Canetti, R .
JOURNAL OF CRYPTOLOGY, 2000, 13 (01) :143-202
[10]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214