Secure outsourced garbled circuit evaluation for mobile devices

被引:26
|
作者
Carter, Henry [1 ]
Mood, Benjamin [2 ]
Traynor, Patrick [2 ]
Butler, Kevin [2 ]
机构
[1] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
[2] Univ Florida, Sch Comp & Informat Sci & Engn, Gainesville, FL USA
基金
美国国家科学基金会;
关键词
Garbled circuits; mobile privacy; secure function evaluation;
D O I
10.3233/JCS-150540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet only have access to the comparatively sparse computational resources associated with their mobile phones, and those willing and able to pay for access to public cloud computing infrastructure cannot be assured that their data will remain unexposed. We address this problem by creating a new SFE protocol that allows mobile devices to securely outsource the majority of computation required to evaluate a garbled circuit. Our protocol, which builds on the most efficient garbled circuit evaluation techniques, includes a new outsourced oblivious transfer primitive that requires significantly less bandwidth and computation than standard OT primitives and outsourced input validation techniques that force the cloud to prove that it is executing all protocols correctly. After showing that our extensions are secure in the malicious model, we conduct an extensive performance evaluation for a number of standard SFE test applications as well as a privacy-preserving navigation application designed specifically for the mobile use-case. Our system reduces execution time by 98.92% and bandwidth by 99.95% for the edit distance problem of size 128 compared to non-outsourced evaluation. These results show that even the least capable devices are capable of using large garbled circuits for secure computation.
引用
收藏
页码:137 / 180
页数:44
相关论文
共 30 条
  • [21] On the Communication Complexity of Secure Function Evaluation with Long Output
    Hubacek, Pavel
    Wichs, Daniel
    PROCEEDINGS OF THE 6TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE (ITCS'15), 2015, : 163 - 172
  • [22] mPrivacy: A Privacy Policy Engine and Safeguard Mechanism in Mobile Devices
    Zhang, Zhong
    Shin, Minho
    APPLIED SCIENCES-BASEL, 2021, 11 (24):
  • [23] A Hybrid Approach to Secure Function Evaluation using SGX
    Choi, Joseph I.
    Tian, Dave
    Hernandez, Grant
    Patton, Christopher
    Mood, Benjamin
    Shrimpton, Thomas
    Butler, Kevin R. B.
    Traynor, Patrick
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 100 - 113
  • [24] A Fast and Verified Software Stack for Secure Function Evaluation
    Almeida, Jose Bacelar
    Barbosa, Manuel
    Barthe, Gilles
    Dupressoir, Francois
    Gregoire, Benjamin
    Laporte, Vincent
    Pereira, Vitor
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1989 - 2006
  • [25] Secure Trust Evaluation Using Multipath and Referral Chain Methods
    Raeini, Mohammad G.
    Nojoumian, Mehrdad
    SECURITY AND TRUST MANAGEMENT, STM 2019, 2019, 11738 : 124 - 139
  • [26] Rate-Limited Secure Function Evaluation: Definitions and Constructions
    Dagdelen, Oezguer
    Mohassel, Payman
    Venturi, Daniele
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 461 - 478
  • [27] Statistical security conditions for two-party secure function evaluation
    Crepeau, Claude
    Wullschleger, Juerg
    INFORMATION THEORETIC SECURITY, PROCEEDINGS, 2008, 5155 : 86 - +
  • [28] Mix and match: Secure function evaluation via ciphertexts - (Extended abstract)
    Jakobsson, M
    Juels, A
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 162 - 177
  • [29] Poster: Framework for Semi-Private Function Evaluation with Application to Secure Insurance Rate Calculation
    Guenther, Daniel
    Kiss, Agnes
    Scheidel, Lukas
    Schneider, Thomas
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2541 - 2543
  • [30] HWGN2: Side-Channel Protected NNs Through Secure and Private Function Evaluation
    Hashemi, Mohammad
    Roy, Steffi
    Forte, Domenic
    Ganji, Fatemeh
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2022, 2022, 13783 : 225 - 248