How to Efficiently Evaluate RAM Programs with Malicious Security

被引:18
作者
Afshar, Arash [1 ]
Hu, Zhangxiang [2 ]
Mohassel, Payman [3 ]
Rosulek, Mike [2 ]
机构
[1] Univ Calgary, Calgary, AB, Canada
[2] Oregon State Univ, Corvallis, OR 97331 USA
[3] Yahoo Labs, Sunnyvale, CA USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I | 2015年 / 9056卷
关键词
2-PARTY COMPUTATION;
D O I
10.1007/978-3-662-46800-5_27
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure 2-party computation (2PC) is becoming practical for some applications. However, most approaches are limited by the fact that the desired functionality must be represented as a boolean circuit. In response, random-access machines (RAM programs) have recently been investigated as a promising alternative representation. In this work, we present the first practical protocols for evaluating RAM programs with security against malicious adversaries. A useful efficiency measure is to divide the cost of malicious-secure evaluation of f by the cost of semi-honest-secure evaluation of f. Our RAM protocols achieve ratios matching the state of the art for circuit-based 2PC. For statistical security 2-s, our protocol without preprocessing achieves a ratio of s; our online-offline protocol has a pre-processing phase and achieves online ratio similar to 2s/log T, where T is the total execution time of the RAM program. To summarize, our solutions show that the "extra overhead" of obtaining malicious security for RAM programs (beyond what is needed for circuits) is minimal and does not grow with the running time of the program.
引用
收藏
页码:702 / 729
页数:28
相关论文
共 27 条
  • [1] Afshar A., 2014, 2014759 CRYPT EPRINT
  • [2] [Anonymous], LNCS
  • [3] [Anonymous], 1987, 19 ACM STOC, DOI DOI 10.1145/28395.28420
  • [4] Beaver D., 1997, 29 ACM STOC, P446, DOI DOI 10.1145/258533.258637
  • [5] Bellare M, 2012, LECT NOTES COMPUT SC, V7658, P134, DOI 10.1007/978-3-642-34961-4_10
  • [6] Fully, (Almost) Tightly Secure IBE and Dual System Groups
    Chen, Jie
    Wee, Hoeteck
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 435 - 460
  • [7] Chung K.M., 2013, SIMPLE ORAM TECHNICA
  • [8] Gentry C, 2014, LECT NOTES COMPUT SC, V8441, P405, DOI 10.1007/978-3-642-55220-5_23
  • [9] Software protection and simulation on oblivious RAMs
    Goldreich, O
    Ostrovsky, R
    [J]. JOURNAL OF THE ACM, 1996, 43 (03) : 431 - 473
  • [10] Huang Y, 2014, LECT NOTES COMPUT SC, V8617, P458, DOI 10.1007/978-3-662-44381-1_26