Secure Arithmetic Computation with Constant Computational Overhead

被引:36
作者
Applebaum, Benny [1 ]
Damgard, Ivan [2 ]
Ishai, Yuval [3 ,4 ]
Nielsen, Michael [2 ]
Zichron, Lior [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aarhus Univ, Aarhus, Denmark
[3] Technion, Haifa, Israel
[4] UCLA, Haifa, Israel
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I | 2017年 / 10401卷
基金
欧洲研究理事会; 欧盟地平线“2020”; 美国国家科学基金会;
关键词
PSEUDORANDOM GENERATORS; STRETCH;
D O I
10.1007/978-3-319-63688-7_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the complexity of securely evaluating an arithmetic circuit over a finite field F in the setting of secure two-party computation with semi-honest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with log vertical bar F vertical bar or polylogarithmically with the security parameter. We present the first protocol that only makes a constant (amortized) number of field operations per gate. The protocol uses the underlying field F as a black box, and its security is based on arithmetic analogues of well-studied cryptographic assumptions. Our protocol is particularly appealing in the special case of securely evaluating a "vector-OLE" function of the form ax + b, where x is an element of F is the input of one party and a, b is an element of F-w are the inputs of the other party. In this case, which is motivated by natural applications, our protocol can achieve an asymptotic rate of 1/3 (i.e., the communication is dominated by sending roughly 3w elements of F). Our implementation of this protocol suggests that it outperforms competing approaches even for relatively small fields F and over fast networks. Our technical approach employs two new ingredients that may be of independent interest. First, we present a general way to combine any linear code that has a fast encoder and a cryptographic ("LPN-style") pseudorandomness property with another linear code that supports fast encoding and erasure-decoding, obtaining a code that inherits both the pseudorandomness feature of the former code and the efficiency features of the latter code. Second, we employ local arithmetic pseudo-random generators, proposing arithmetic generalizations of boolean candidates that resist all known attacks.
引用
收藏
页码:223 / 254
页数:32
相关论文
共 54 条
  • [21] Applebaum B, 2012, LECT NOTES COMPUT SC, V7194, P600, DOI 10.1007/978-3-642-28914-9_34
  • [22] Applebaum B, 2010, ACM S THEORY COMPUT, P171
  • [23] Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
  • [24] Blum Avrim, 1993, LNCS, P278, DOI DOI 10.1007/3-540-48329-224
  • [25] Efficient generation of shared RSA keys
    Boneh, D
    Franklin, M
    [J]. JOURNAL OF THE ACM, 2001, 48 (04) : 702 - 722
  • [26] Cramer R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P119
  • [27] Damgård I, 2001, LECT NOTES COMPUT SC, V1992, P119
  • [28] Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
  • [29] Dowlin N, 2016, PR MACH LEARN RES, V48
  • [30] Erkin Z, 2009, LECT NOTES COMPUT SC, V5672, P235, DOI 10.1007/978-3-642-03168-7_14