MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation

被引:0
|
作者
Riazi, M. Sadegh [1 ]
Javaheripi, Mojan [1 ]
Hussain, Siam U. [1 ]
Koushanfar, Farinaz [1 ]
机构
[1] Univ Calif San Diego, La Jolla, CA 92093 USA
关键词
Multi-party computation; secure function evaluation; logic synthesis; secure auction; secure voting; private-set intersection; stable matching; nearest-neighbor search; PRIVACY;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Secure Multi-party Computation (MPC) is one of the most influential achievements of modern cryptography: it allows evaluation of an arbitrary function on private inputs from multiple parties without revealing the inputs. A crucial step of utilizing contemporary MPC protocols is to describe the function as a Boolean circuit. While efficient solutions have been proposed for special case of two-party secure computation, the general case of more than two-party is not addressed. This paper proposes MPCircuits, the first automated solution to devise the optimized Boolean circuit representation for any MPC function using hardware synthesis tools with new customized libraries that are scalable to multiple parties. MPCircuits creates a new end-to-end tool-chain to facilitate practical scalable MPC realization. To illustrate the practicality of MPCircuits, we design and implement a set of five circuits that represent real-world MPC problems. Our benchmarks inherently have different computational and communication complexities and are good candidates to evaluate MPC protocols. We also formalize the metrics by which a given protocol can be analyzed. We provide extensive experimental evaluations for these benchmarks; two of which are the first reported solutions in multi-party settings. As our experimental results indicate, MPCircuits reduces the computation time of MPC protocols by up to 4.2x.
引用
收藏
页码:198 / 207
页数:10
相关论文
共 50 条
  • [1] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [2] On compiling Boolean circuits optimized for secure multi-party computation
    Niklas Büscher
    Martin Franz
    Andreas Holzer
    Helmut Veith
    Stefan Katzenbeisser
    [J]. Formal Methods in System Design, 2017, 51 : 308 - 331
  • [3] On compiling Boolean circuits optimized for secure multi-party computation
    Buescher, Niklas
    Franz, Martin
    Holzer, Andreas
    Veith, Helmut
    Katzenbeisser, Stefan
    [J]. FORMAL METHODS IN SYSTEM DESIGN, 2017, 51 (02) : 308 - 331
  • [4] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [5] Efficient Joint Random Number Generation for Secure Multi-party Computation
    Hoogerwerf, Erwin
    van Tetering, Daphne
    Bay, Asli
    Erkin, Zekeriya
    [J]. SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 436 - 443
  • [6] Information theory and secure multi-party computation
    Maurer, UM
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [7] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [8] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [9] Secure multi-party computation made simple
    Maurer, U
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [10] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569