Secure Arithmetic Computation with Constant Computational Overhead

被引:36
|
作者
Applebaum, Benny [1 ]
Damgard, Ivan [2 ]
Ishai, Yuval [3 ,4 ]
Nielsen, Michael [2 ]
Zichron, Lior [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aarhus Univ, Aarhus, Denmark
[3] Technion, Haifa, Israel
[4] UCLA, Haifa, Israel
来源
基金
美国国家科学基金会; 欧洲研究理事会; 欧盟地平线“2020”;
关键词
PSEUDORANDOM GENERATORS; STRETCH;
D O I
10.1007/978-3-319-63688-7_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the complexity of securely evaluating an arithmetic circuit over a finite field F in the setting of secure two-party computation with semi-honest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with log vertical bar F vertical bar or polylogarithmically with the security parameter. We present the first protocol that only makes a constant (amortized) number of field operations per gate. The protocol uses the underlying field F as a black box, and its security is based on arithmetic analogues of well-studied cryptographic assumptions. Our protocol is particularly appealing in the special case of securely evaluating a "vector-OLE" function of the form ax + b, where x is an element of F is the input of one party and a, b is an element of F-w are the inputs of the other party. In this case, which is motivated by natural applications, our protocol can achieve an asymptotic rate of 1/3 (i.e., the communication is dominated by sending roughly 3w elements of F). Our implementation of this protocol suggests that it outperforms competing approaches even for relatively small fields F and over fast networks. Our technical approach employs two new ingredients that may be of independent interest. First, we present a general way to combine any linear code that has a fast encoder and a cryptographic ("LPN-style") pseudorandomness property with another linear code that supports fast encoding and erasure-decoding, obtaining a code that inherits both the pseudorandomness feature of the former code and the efficiency features of the latter code. Second, we employ local arithmetic pseudo-random generators, proposing arithmetic generalizations of boolean candidates that resist all known attacks.
引用
收藏
页码:223 / 254
页数:32
相关论文
共 50 条
  • [1] Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
    Damgard, Ivan
    Ishai, Yuval
    Kroigaard, Mikkel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 445 - +
  • [2] Secure Computation with Constant Communication Overhead Using Multiplication Embeddings
    Block, Alexander R.
    Maji, Hemanta K.
    Nguyen, Hai H.
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2018, 2018, 11356 : 375 - 398
  • [3] Constant-Overhead Secure Computation of Boolean Circuits using Preprocessing
    Damgard, Ivan
    Zakarias, Sarah
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 621 - 641
  • [4] Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
    Polychroniadou, Antigoni
    Song, Yifan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II, 2021, 12697 : 812 - 841
  • [5] Cryptography with Constant Computational Overhead
    Ishai, Yuval
    Kushilevitz, Eyal
    Ostrovsky, Rafail
    Sahai, Amit
    STOC'08: PROCEEDINGS OF THE 2008 ACM INTERNATIONAL SYMPOSIUM ON THEORY OF COMPUTING, 2008, : 433 - +
  • [6] Secure Arithmetic Computation with No Honest Majority
    Ishai, Yuval
    Prabhakaran, Manoj
    Sahai, Amit
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 294 - +
  • [7] LevioSA: Lightweight Secure Arithmetic Computation
    Hazay, Carmit
    Ishai, Yuval
    Marcedone, Antonio
    Venkitasubramaniam, Muthuramakrishnan
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 327 - 344
  • [8] The Cost of IEEE Arithmetic in Secure Computation
    Archer, David W.
    Atapoor, Shahla
    Smart, Nigel P.
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2021, 2021, 12912 : 431 - 452
  • [9] Oblivious Transfer with Constant Computational Overhead
    Boyle, Elette
    Couteau, Geoffroy
    Gilboa, Niv
    Ishai, Yuval
    Kohl, Lisa
    Resch, Nicolas
    Scholl, Peter
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT I, 2023, 14004 : 271 - 302
  • [10] Concurrently Secure Computation in Constant Rounds
    Garg, Sanjam
    Goyal, Vipul
    Jain, Abhishek
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2012, 2012, 7237 : 99 - 116