Secure Arithmetic Computation with Constant Computational Overhead

被引:36
作者
Applebaum, Benny [1 ]
Damgard, Ivan [2 ]
Ishai, Yuval [3 ,4 ]
Nielsen, Michael [2 ]
Zichron, Lior [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aarhus Univ, Aarhus, Denmark
[3] Technion, Haifa, Israel
[4] UCLA, Haifa, Israel
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I | 2017年 / 10401卷
基金
欧洲研究理事会; 欧盟地平线“2020”; 美国国家科学基金会;
关键词
PSEUDORANDOM GENERATORS; STRETCH;
D O I
10.1007/978-3-319-63688-7_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the complexity of securely evaluating an arithmetic circuit over a finite field F in the setting of secure two-party computation with semi-honest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with log vertical bar F vertical bar or polylogarithmically with the security parameter. We present the first protocol that only makes a constant (amortized) number of field operations per gate. The protocol uses the underlying field F as a black box, and its security is based on arithmetic analogues of well-studied cryptographic assumptions. Our protocol is particularly appealing in the special case of securely evaluating a "vector-OLE" function of the form ax + b, where x is an element of F is the input of one party and a, b is an element of F-w are the inputs of the other party. In this case, which is motivated by natural applications, our protocol can achieve an asymptotic rate of 1/3 (i.e., the communication is dominated by sending roughly 3w elements of F). Our implementation of this protocol suggests that it outperforms competing approaches even for relatively small fields F and over fast networks. Our technical approach employs two new ingredients that may be of independent interest. First, we present a general way to combine any linear code that has a fast encoder and a cryptographic ("LPN-style") pseudorandomness property with another linear code that supports fast encoding and erasure-decoding, obtaining a code that inherits both the pseudorandomness feature of the former code and the efficiency features of the latter code. Second, we employ local arithmetic pseudo-random generators, proposing arithmetic generalizations of boolean candidates that resist all known attacks.
引用
收藏
页码:223 / 254
页数:32
相关论文
共 54 条
  • [1] MORE ON AVERAGE CASE VS APPROXIMATION COMPLEXITY
    Alekhnovich, Michael
    [J]. COMPUTATIONAL COMPLEXITY, 2011, 20 (04) : 755 - 786
  • [2] [Anonymous], 2004, FDN CRYPTOGRAPHY BAS
  • [3] [Anonymous], 2016602 CRYPT EPRINT
  • [4] [Anonymous], 2015, P 22 ANN NETW DISTR
  • [5] [Anonymous], 2009, P 12 INT C INF SEC C, DOI [10.1007/978-3-642-14423-3_16, DOI 10.1007/978-3-642-14423-3_16]
  • [6] [Anonymous], ABS170104521 CORR
  • [7] [Anonymous], 1999, LNCS, DOI DOI 10.1007/3-540-48405-1_8
  • [8] [Anonymous], 2016, IACR Cryptology ePrint Archive, page
  • [9] [Anonymous], 2014, P 5 INN THEOR COMP S
  • [10] [Anonymous], 2015546 CRYPT EPRINT