Secure Arithmetic Computation with Constant Computational Overhead

被引:36
|
作者
Applebaum, Benny [1 ]
Damgard, Ivan [2 ]
Ishai, Yuval [3 ,4 ]
Nielsen, Michael [2 ]
Zichron, Lior [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] Aarhus Univ, Aarhus, Denmark
[3] Technion, Haifa, Israel
[4] UCLA, Haifa, Israel
来源
基金
美国国家科学基金会; 欧洲研究理事会; 欧盟地平线“2020”;
关键词
PSEUDORANDOM GENERATORS; STRETCH;
D O I
10.1007/978-3-319-63688-7_8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the complexity of securely evaluating an arithmetic circuit over a finite field F in the setting of secure two-party computation with semi-honest adversaries. In all existing protocols, the number of arithmetic operations per multiplication gate grows either linearly with log vertical bar F vertical bar or polylogarithmically with the security parameter. We present the first protocol that only makes a constant (amortized) number of field operations per gate. The protocol uses the underlying field F as a black box, and its security is based on arithmetic analogues of well-studied cryptographic assumptions. Our protocol is particularly appealing in the special case of securely evaluating a "vector-OLE" function of the form ax + b, where x is an element of F is the input of one party and a, b is an element of F-w are the inputs of the other party. In this case, which is motivated by natural applications, our protocol can achieve an asymptotic rate of 1/3 (i.e., the communication is dominated by sending roughly 3w elements of F). Our implementation of this protocol suggests that it outperforms competing approaches even for relatively small fields F and over fast networks. Our technical approach employs two new ingredients that may be of independent interest. First, we present a general way to combine any linear code that has a fast encoder and a cryptographic ("LPN-style") pseudorandomness property with another linear code that supports fast encoding and erasure-decoding, obtaining a code that inherits both the pseudorandomness feature of the former code and the efficiency features of the latter code. Second, we employ local arithmetic pseudo-random generators, proposing arithmetic generalizations of boolean candidates that resist all known attacks.
引用
收藏
页码:223 / 254
页数:32
相关论文
共 50 条
  • [41] EQUIVOCATING YAO: CONSTANT-ROUND ADAPTIVELY SECURE MULTIPARTY COMPUTATION IN THE PLAIN MODEL
    Canetti, Ran
    Poburinnaya, Oxana
    Venkitasubramaniam, Muthuramakrishnan
    SIAM JOURNAL ON COMPUTING, 2022, 51 (02)
  • [42] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Hazay, Carmit
    Yanai, Avishay
    JOURNAL OF CRYPTOLOGY, 2019, 32 (04) : 1144 - 1199
  • [43] Bounded-concurrent secure two-party computation in a constant number of rounds
    Pass, R
    Rosen, A
    44TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2003, : 404 - 413
  • [44] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Hazay, Carmit
    Yanai, Avishay
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553
  • [45] Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model
    Canetti, Ran
    Poburinnaya, Oxana
    Venkitasubramaniam, Muthuramakrishnan
    STOC'17: PROCEEDINGS OF THE 49TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING, 2017, : 497 - 509
  • [46] Multiparty computation with full computation power and reduced overhead
    Ma, QK
    Hao, W
    Yen, IL
    Bastani, F
    EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING, PROCEEDINGS, 2004, : 241 - 248
  • [47] Cryptanalysis of secure arithmetic coding
    Zhou, Jiantao
    Au, Oscar C.
    Wong, Peter H.
    Fan, Xiaopeng
    2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1769 - 1772
  • [48] On the Security of the Secure Arithmetic Code
    Sun, Hung-Min
    Wang, King-Hang
    Ting, Wei-Chih
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) : 781 - 789
  • [49] Computational Secure ORAM (COMP SE-ORAM) with (ω)over-tilde(log n) overhead
    Mbelli, Thierry Mbah
    2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 99 - 102
  • [50] SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks
    Jain, Vineeta
    Wetzker, Ulf
    Laxmi, Vijay
    Gaur, Manoj Singh
    Mosbah, Mohamed
    Mery, Dominique
    IEEE ACCESS, 2023, 11 : 84620 - 84635