Secure Arithmetic Computation with Constant Computational Overhead

被引:36
|
作者
Applebaum, Benny [1 ]
Damgard, Ivan [2 ]
Ishai, Yuval [3 ,4 ]
Nielsen, Michael [2 ]
Zichron, Lior [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aarhus Univ, Aarhus, Denmark
[3] Technion, Haifa, Israel
[4] UCLA, Haifa, Israel
来源
基金
美国国家科学基金会; 欧洲研究理事会; 欧盟地平线“2020”;
关键词
PSEUDORANDOM GENERATORS; STRETCH;
D O I
10.1007/978-3-319-63688-7_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the complexity of securely evaluating an arithmetic circuit over a finite field F in the setting of secure two-party computation with semi-honest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with log vertical bar F vertical bar or polylogarithmically with the security parameter. We present the first protocol that only makes a constant (amortized) number of field operations per gate. The protocol uses the underlying field F as a black box, and its security is based on arithmetic analogues of well-studied cryptographic assumptions. Our protocol is particularly appealing in the special case of securely evaluating a "vector-OLE" function of the form ax + b, where x is an element of F is the input of one party and a, b is an element of F-w are the inputs of the other party. In this case, which is motivated by natural applications, our protocol can achieve an asymptotic rate of 1/3 (i.e., the communication is dominated by sending roughly 3w elements of F). Our implementation of this protocol suggests that it outperforms competing approaches even for relatively small fields F and over fast networks. Our technical approach employs two new ingredients that may be of independent interest. First, we present a general way to combine any linear code that has a fast encoder and a cryptographic ("LPN-style") pseudorandomness property with another linear code that supports fast encoding and erasure-decoding, obtaining a code that inherits both the pseudorandomness feature of the former code and the efficiency features of the latter code. Second, we employ local arithmetic pseudo-random generators, proposing arithmetic generalizations of boolean candidates that resist all known attacks.
引用
收藏
页码:223 / 254
页数:32
相关论文
共 50 条
  • [21] Provably secure cloud storage for mobile networks with less computation and smaller overhead
    Rui Zhang
    Hui Ma
    Yao Lu
    Yang Li
    Science China Information Sciences, 2017, 60
  • [22] Provably secure cloud storage for mobile networks with less computation and smaller overhead
    Zhang, Rui
    Ma, Hui
    Lu, Yao
    Li, Yang
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (12)
  • [23] Provably secure cloud storage for mobile networks with less computation and smaller overhead
    Rui ZHANG
    Hui MA
    Yao LU
    Yang LI
    ScienceChina(InformationSciences), 2017, 60 (12) : 179 - 191
  • [24] Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds
    Dachman-Soled, Dana
    Katz, Jonathan
    Rao, Vanishree
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 586 - 613
  • [25] Completeness in two-party secure computation: A computational view
    Harnik, Danny
    Naor, Moni
    Reingold, Omer
    Rosen, Alon
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 521 - 552
  • [26] Completeness in Two-Party Secure Computation: A Computational View
    Danny Harnik
    Moni Naor
    Omer Reingold
    Alon Rosen
    Journal of Cryptology, 2006, 19 : 521 - 552
  • [27] Computation of Dynamic Line Rating of Overhead Transmission Line Using Weather Forecast and Interval Arithmetic
    Chaichana, Artitaya
    2018 IEEE INTERNATIONAL CONFERENCE ON ENVIRONMENT AND ELECTRICAL ENGINEERING AND 2018 IEEE INDUSTRIAL AND COMMERCIAL POWER SYSTEMS EUROPE (EEEIC / I&CPS EUROPE), 2018,
  • [28] Constant-round linear-broadcast secure computation with penalties
    Nakai, Takeshi
    Shinagawa, Kazumasa
    THEORETICAL COMPUTER SCIENCE, 2023, 959
  • [29] Arithmetic cryptography protocol for secure multi-party computation (non-refereed)
    Mishra, Durgesh Kumar
    Chandwani, Manohar
    PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 22 - 22
  • [30] One-Round Secure Multiparty Computation of Arithmetic Streams and Functions (Extended Abstract)
    Bitan, Dor
    Dolev, Shlomi
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING, CSCML 2018, 2018, 10879 : 255 - 273