New Approaches to Practical Secure Two-Party Computation
نویسندگان
چکیده
We present two new approaches to maliciously secure two-party computation with practical efficiency: • First, we present the first maliciously secure two-party computation protocol with practical efficiency based on the classic semi-honest protocol given by Goldreich et al. at STOC 1987. Before now all practical protocols with malicious security were based on Yao’s garbled circuits. We report on an implementation of this protocol demonstrating its high efficiency. For larger circuits it evaluates 20000 Boolean gates per second. As an example, evaluating one oblivious AES encryption (around 34000 gates) takes 64 seconds, but when repeating the task 27 times it only takes less than 3 seconds per instance. • Second, we revisit the LEGO protocol of Nielsen and Orlandi presented at TCC 2009. Their protocol demonstrated a more efficient technique to get malicious security in secure two-party computation protocols based on Yao’s garbled circuit. Namely, doing the cut-n-choose test on the gate level instead of the circuit level. This idea speeds up the protocol by a factor the logarithm of the size of the circuit to be evaluated. The resulting protocol, however, was not considered practically efficient as it relies on public-key operations for every gate of the circuit. We demonstrate how to get rid of this dependency on public-key operations by replacing them with inexpensive Minicrypt type primitives. The resulting protocol maintains the LEGO protocols good asymptotic complexity, hopefully yielding a protocol of high practical efficiency. • As a bi-product of these two new protocols for secure two-party computations we develop two new cryptographic tools of independent interest: for the first protocol we give a highly practical OT-extension protocol that, apart from a few OTs to bootstrap the construction, only needs 14 calls to hash function for each OT. For the second protocol we develop a new XOR-homomorphic commitment scheme based on OT.
منابع مشابه
Secure Two-Party Computation: Generic Approach and Exploiting Specific Properties of Functions Approach
Introduced by Yao in early 1980s, secure computation is being one among the major area of research interest among cryptologists. In three decades of its growth, secure computation which can be called as two-party computation, or multiparty computation depending on the number of parties involved has experienced vast diversities. Research has been carried out by exploiting specific properties of ...
متن کاملSecure Computation on Mobile Devices
Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the researc...
متن کاملOn Secure Two-party Computation
1.1. Secure Two-Party Computation. In essence, secure multiparty computation is the solution to the problem how to compute on private inputs from several parties when we do not trust other parties and we don’t have a central authority who can get inputs, perform computations and give outputs to those that need them. Here we will talk about secure twoparty computation, where Alice, holding xa an...
متن کاملEfficient Secure Computation with Garbled Circuits
Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, we show the potential of building privacy-preserving applications using garbled circuits, a generic technique that until recently was believed to be too inefficient to s...
متن کاملPractical Secure Two-Party Computation: Techniques, Tools, and Applications
Many compelling applications involve computations that require sensitive data from two or more individuals. As an example, consider the myriad genetics applications soon to be within reach of individuals as the cost of personal genome sequencing rapidly plummets. An individual may wish to compare her genome with the genomes of different groups of participants in a study to determine which treat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013