TinyKeys: A New Approach to Efficient Multi-Party Computation

被引:3
|
作者
Hazay, Carmit [1 ]
Orsini, Emmanuela [2 ]
Scholl, Peter [3 ]
Soria-Vazquez, Eduardo [4 ]
机构
[1] Bar Ilan Univ, Ramat Gan, Israel
[2] Katholieke Univ Leuven, IMEC, COSIC, Leuven, Belgium
[3] Aarhus Univ, Aarhus, Denmark
[4] Technol Innovat Inst, Cryptog Res Ctr, Abu Dhabi, U Arab Emirates
基金
欧洲研究理事会;
关键词
Multi-Party Computation; Syndrome Decoding; Large-Scale; XOR GATES; ALGORITHM; SECURITY; CIRCUIT; CODE; BMR;
D O I
10.1007/s00145-022-09423-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact that within the dishonest majority setting the efficiency of most practical protocols does not depend on the number of honest parties, we investigate how to construct protocols which improve in efficiency as the number of honest parties increases. Our central idea is to take a protocol which is secure for n - 1 corruptions and modify it to use short symmetric keys, with the aim of basing security on the concatenation of all honest parties' keys. This results in a more efficient protocol tolerating fewer corruptions, whilst also introducing an LPN-style syndrome decoding assumption. We first apply this technique to a modified version of the semi-honest GMW protocol, using OT extension with short keys, to improve the efficiency of standard GMW with fewer corruptions. We also obtain more efficient constant-round MPC, using BMR-style garbled circuits with short keys, and present an implementation of the online phase of this protocol. Our techniques start to improve upon existing protocols when there are around n = 10 parties with h = 4 honest parties, and as these increase we obtain up to a 13 times reduction (for n = 400, h = 120) in communication complexity for our GMW variant, compared with the best-known GMW-based protocol modified to use the same threshold.
引用
收藏
页数:66
相关论文
共 50 条
  • [1] TinyKeys: A New Approach to Efficient Multi-Party Computation
    Hazay, Carmit
    Orsini, Emmanuela
    Scholl, Peter
    Soria-Vazquez, Eduardo
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 : 3 - 33
  • [2] TinyKeys: A New Approach to Efficient Multi-Party Computation
    Carmit Hazay
    Emmanuela Orsini
    Peter Scholl
    Eduardo Soria-Vazquez
    [J]. Journal of Cryptology, 2022, 35
  • [3] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    [J]. EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [4] Efficient multi-party computation with dispute control
    Beerliova-Trubiniova, Zuzana
    Hirt, Martin
    [J]. THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 305 - 328
  • [5] Efficient multi-party computation over rings
    Cramer, R
    Fehr, S
    Ishai, Y
    Kushilevitz, E
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 596 - 613
  • [6] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [7] An efficient approach for secure multi-party computation without authenticated channel
    Duy-Hien Vu
    The-Dung Luong
    Tu-Bao Ho
    [J]. INFORMATION SCIENCES, 2020, 527 : 356 - 368
  • [8] A New Approach to Interdomain Routing Based on Secure Multi-Party Computation
    Gupta, Debayan
    Segal, Aaron
    Panda, Aurojit
    Segev, Gil
    Schapira, Michael
    Feigenbaum, Joan
    Rexford, Jenifer
    Shenker, Scott
    [J]. PROCEEDINGS OF THE 11TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-XI), 2012, : 37 - 42
  • [9] Batch Logical Protocols for Efficient Multi-Party Computation
    Kiribuchi, Naoto
    Kato, Ryo
    Endo, Tsukasa
    Nishide, Takashi
    Yoshiura, Hiroshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (10) : 1718 - 1728
  • [10] Rabbit: Efficient Comparison for Secure Multi-Party Computation
    Makri, Eleftheria
    Rotaru, Dragos
    Vercauteren, Frederik
    Wagh, Sameer
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 249 - 270