Millions of Millionaires: Multiparty Computation in Large Networks
نویسندگان
چکیده
We describe a general Multi-Party Computation (MPC) protocol for arithmetic circuitsthat is secure against a static malicious adversary corrupting up to a 1/7 fraction of theparties. The protocol requires each party to send an average of O(mn log 3 n)bits, and computeO(mn log 4 n)operations in a network of size n, where m is the size of circuit. This is achieved byincreasing latency from constant to O(d), where d is the depth of the circuit. Our protocol hasa setup phase that is independent of the circuit and relies on Threshold Fully HomomorphicEncryption (TFHE). The setup requires each party to send Õ(κ) messages and compute Õ(κ)operations, where κ is the security parameter. We provide results from microbenchmarksconducted over a sorting network showing that our protocol may be practical for deploymentin large networks. For example, we consider a network of size 2 (over 33 million) where eachparty has an input item of size 20 bytes. To securely sort the items, our protocol requires eachparty on average to send 5 kilobytes per item sorted.
منابع مشابه
Key Technologies and Applications of Secure Multiparty Computation
With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introdu...
متن کاملOn Secure Two-party Computation
1.1. Secure Two-Party Computation. In essence, secure multiparty computation is the solution to the problem how to compute on private inputs from several parties when we do not trust other parties and we don’t have a central authority who can get inputs, perform computations and give outputs to those that need them. Here we will talk about secure twoparty computation, where Alice, holding xa an...
متن کاملAn Efficient Protocol for Yao?s Millionaires? Problem
The increase in volume and sensitivity of data communicated and processed over the Internet has been accompanied by a corresponding need for e-commerce techniques in which entities can participate in a secure and anonymous fashion. Even simple arithmetic operations over a set of integers partitioned over a network require sophisticated algorithms. As a part of our earlier work, we have develope...
متن کاملUnconditionally Secure Multiparty Computation and Secret Sharing
We suggest protocols for secure computation of the sum, product, and some other functions of three or more elements of an arbitrary constructible ring, without using any one-way functions. A new input that we offer here is that, in contrast with other proposals, we conceal “intermediate results” of a computation, i.e., we do not let any party accumulate functions of other parties’ private numbe...
متن کاملNew Protocols for Secure Equality Test and Comparison
Protocols for securely comparing private values are among the most fundamental building blocks of multiparty computation. Introduced by Yao under the name millionaire’s problem, they have found numerous applications in a variety of privacy-preserving protocols; however, due to their inherent non-arithmetic structure, existing construction often remain an important bottleneck in large-scale secu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014