Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security

被引:6
|
作者
Wu, Yulin [1 ]
Wang, Xuan [1 ]
Susilo, Willy [3 ]
Yang, Guomin [3 ]
Jiang, Zoe L. [1 ,2 ]
Li, Junyi [1 ]
Liu, Xueqiao [3 ]
机构
[1] Harbin Inst Technol, Shenzhen, Guangdong, Peoples R China
[2] Peng Cheng Lab, Shenzhen, Guangdong, Peoples R China
[3] Univ Wollongong, Wollongong, NSW 2522, Australia
基金
中国国家自然科学基金;
关键词
Mixed-protocol; Secure multi-party computation; Homomorphic commitments; Share conversions; 2-PARTY COMPUTATION;
D O I
10.1016/j.csi.2021.103570
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of secure multi-party computation (MPC) over past decades, applications of MPC has been moving from completing simple computation tasks (e.g., private set intersection) to complex computation tasks (e.g., privacy-preserving machine learning). This is an inevitable trend when more strict privacy protection requirements face more complex and large-scale computation such as big data analytics being applied in many fields. Although the complex computation tasks are not easy to be evaluated with one type of MPC protocols from beginning to the end, it can be more efficiently evaluated by decomposing the complex task into many simple sub-tasks and evaluating each of them with the proper type of MPC protocol in sequence. Therefore, we propose a mixed-protocol MPC framework towards complex computation tasks with malicious security in this work. In particular, we utilize the homomorphic commitment technique to construct six types of share conversion protocols in the malicious model. Then, we construct the maliciously secure mixed-protocol MPC framework based on these share conversion protocols. This is the first maliciously secure mixed-protocol MPC framework relying on the standard model, providing a higher security guarantee than all the previous works in the literature. Also, this is the first general mixed-protocol MPC framework for n parties in the malicious model, in comparison to previous works that either only support fixed number of parties in the malicious model, or only handle limited types of share conversions. Furthermore, we provide the theoretical analysis of the computation and communication costs for the six types of share conversion protocols, as an important reference for future developers, who intend to implement some complex computation task by following this mixed-protocol MPC framework with malicious security.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] MOTION - A Framework for Mixed-Protocol Multi-Party Computation
    Braun, Lennart
    Demmler, Daniel
    Schneider, Thomas
    Tkachenko, Oleksandr
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (02)
  • [2] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [3] ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
    Demmler, Daniel
    Schneider, Thomas
    Zohner, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [4] Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks
    Wu, Yulin
    Wang, Xuan
    Susilo, Willy
    Yang, Guomin
    Jiang, Zoe L.
    Wang, Hao
    Wu, Tong
    COMPUTER STANDARDS & INTERFACES, 2022, 80
  • [5] Multi-party computation with hybrid security
    Fitzi, M
    Holenstein, T
    Wullschleger, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 419 - 438
  • [6] A Secure Multi-Party Computation Protocol for Graph Editing Distance against Malicious Attacks
    Liu, Xin
    Kong, Jianwei
    Peng, Lu
    Luo, Dan
    Xu, Gang
    Chen, Xiubo
    Liu, Xiaomeng
    MATHEMATICS, 2023, 11 (23)
  • [7] SECURE MULTI-PARTY COMPUTATION PROTOCOL FOR STATISTICAL COMPUTATION ON ENCRYPTED DATA
    Pathak, Rohit
    Joshi, Satyadhar
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 78 - +
  • [8] Application of Randomness for Security and Privacy in Multi-Party Computation
    Saha, Rahul
    Kumar, Gulshan
    Geetha, G.
    Conti, Mauro
    Buchanan, William J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5694 - 5705
  • [9] Rational protocol of quantum secure multi-party computation
    Dou, Zhao
    Xu, Gang
    Chen, Xiu-Bo
    Niu, Xin-Xin
    Yang, Yi-Xian
    QUANTUM INFORMATION PROCESSING, 2018, 17 (08)
  • [10] Secure multi-party computation protocol for sequencing problem
    ChunMing Tang
    GuiHua Shi
    ZhengAn Yao
    Science China Information Sciences, 2011, 54 : 1654 - 1662