Secure Arithmetic Computation with Constant Computational Overhead

被引:36
|
作者
Applebaum, Benny [1 ]
Damgard, Ivan [2 ]
Ishai, Yuval [3 ,4 ]
Nielsen, Michael [2 ]
Zichron, Lior [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aarhus Univ, Aarhus, Denmark
[3] Technion, Haifa, Israel
[4] UCLA, Haifa, Israel
来源
基金
美国国家科学基金会; 欧洲研究理事会; 欧盟地平线“2020”;
关键词
PSEUDORANDOM GENERATORS; STRETCH;
D O I
10.1007/978-3-319-63688-7_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the complexity of securely evaluating an arithmetic circuit over a finite field F in the setting of secure two-party computation with semi-honest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with log vertical bar F vertical bar or polylogarithmically with the security parameter. We present the first protocol that only makes a constant (amortized) number of field operations per gate. The protocol uses the underlying field F as a black box, and its security is based on arithmetic analogues of well-studied cryptographic assumptions. Our protocol is particularly appealing in the special case of securely evaluating a "vector-OLE" function of the form ax + b, where x is an element of F is the input of one party and a, b is an element of F-w are the inputs of the other party. In this case, which is motivated by natural applications, our protocol can achieve an asymptotic rate of 1/3 (i.e., the communication is dominated by sending roughly 3w elements of F). Our implementation of this protocol suggests that it outperforms competing approaches even for relatively small fields F and over fast networks. Our technical approach employs two new ingredients that may be of independent interest. First, we present a general way to combine any linear code that has a fast encoder and a cryptographic ("LPN-style") pseudorandomness property with another linear code that supports fast encoding and erasure-decoding, obtaining a code that inherits both the pseudorandomness feature of the former code and the efficiency features of the latter code. Second, we employ local arithmetic pseudo-random generators, proposing arithmetic generalizations of boolean candidates that resist all known attacks.
引用
收藏
页码:223 / 254
页数:32
相关论文
共 50 条
  • [31] Constant-overhead fault-tolerant quantum computation with reconfigurable atom arrays
    Xu, Qian
    Ataides, J. Pablo Bonilla
    Pattison, Christopher A.
    Raveendran, Nithin
    Bluvstein, Dolev
    Wurtz, Jonathan
    Vasic, Bane
    Lukin, Mikhail D.
    Jiang, Liang
    Zhou, Hengyun
    NATURE PHYSICS, 2024, 20 (07) : 1084 - 1090
  • [32] Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions
    Daza, Vanesa
    Makriyannis, Nikolaos
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 581 - 611
  • [33] Secure arithmetic coding
    Kim, Hyungjin
    Wen, Jiangtao
    Villasenor, John D.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (05) : 2263 - 2272
  • [34] Secure computation of constant-depth circuits with applications to database search problems
    Barkol, O
    Ishai, Y
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 395 - 411
  • [35] Perfect constant-round secure computation via perfect randomizing polynomials
    Ishai, Y
    Kushilevitz, E
    AUTOMATA, LANGUAGES AND PROGRAMMING, 2002, 2380 : 244 - 256
  • [36] Time-Efficient Constant-Space-Overhead Fault-Tolerant Quantum Computation
    Hayata Yamasaki
    Masato Koashi
    Nature Physics, 2024, 20 : 247 - 253
  • [37] Time-Efficient Constant-Space-Overhead Fault-Tolerant Quantum Computation
    Yamasaki, Hayata
    Koashi, Masato
    NATURE PHYSICS, 2024, 20 (02) : 182 - 183
  • [38] SECURE COMPUTATION
    MICALI, S
    ROGAWAY, P
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 392 - 404
  • [39] Computation with absolutely no space overhead
    Hemaspaandra, LA
    Mukherji, P
    Tantau, T
    DEVELOPMENTS IN LANGUAGE THEORY, PROCEEDINGS, 2003, 2710 : 325 - 336
  • [40] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Carmit Hazay
    Avishay Yanai
    Journal of Cryptology, 2019, 32 : 1144 - 1199