TASTY: Tool for Automating Secure Two-partY computations

被引:148
作者
Henecka, Wilko [1 ]
Koegl, Stefan [1 ]
Sadeghi, Ahmad-Reza [1 ]
Schneider, Thomas [1 ]
Wehrenberg, Immo [1 ]
机构
[1] Ruhr Univ Bochum, Syst Secur Lab, Bochum, Germany
来源
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10) | 2010年
关键词
Cryptography; secure function evaluation; compiler; garbled circuits; homomorphic encryption; FULLY HOMOMORPHIC ENCRYPTION; EFFICIENT; KEY;
D O I
10.1145/1866307.1866358
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the outcome. Existing cryptographic compilers can automatically generate secure computation protocols from high-level specifications, but are often limited in their use and efficiency of generated protocols as they are based on either garbled circuits or (additively) homomorphic encryption only. In this paper we present TASTY, a novel tool for automating, i.e., describing, generating, executing, benchmarking, and comparing, efficient secure two-party computation protocols. TASTY is a new compiler that can generate protocols based on homomorphic encryption and efficient garbled circuits as well as combinations of both, which often yields the most efficient protocols available today. The user provides a high-level description of the computations to be performed on encrypted data in a domain-specific language. This is automatically transformed into a protocol. TASTY provides most recent techniques and optimizations for practical secure two-party computation with low online latency. Moreover, it allows to efficiently evaluate circuits generated by the well-known Fairplay compiler. We use TASTY to compare protocols for secure multiplication based on homomorphic encryption with those based on garbled circuits and highly efficient Karatsuba multiplication. Further, we show how TASTY improves the online latency for securely evaluating the AES functionality by an order of magnitude compared to previous software implementations. TASTY allows to automatically generate efficient secure protocols for many privacy-preserving applications where we consider the use cases for private set intersection and face recognition protocols.
引用
收藏
页码:451 / 462
页数:12
相关论文
共 49 条
  • [1] [Anonymous], 2009, THESIS
  • [2] [Anonymous], 2004, USENIX SEC S
  • [3] [Anonymous], 2008, IACR CRYPTOLOGY EPRI
  • [4] Barni M, 2009, LECT NOTES COMPUT SC, V5789, P424, DOI 10.1007/978-3-642-04444-1_26
  • [5] Beaver D, 1995, LECT NOTES COMPUT SC, V963, P97
  • [6] Ben-David A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P257
  • [7] Ben-Or M., 2019, Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, P351, DOI [10.1145/62212.62213, DOI 10.1145/62212.62213]
  • [8] Bogdanov D, 2008, LECT NOTES COMPUT SC, V5283, P192
  • [9] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
  • [10] Brickell J, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P498