Millions of Millionaires: Multiparty Computation in Large Networks

نویسندگان

  • Mahdi Zamani
  • Mahnush Movahedi
  • Jared Saia
چکیده

We describe a general Multi-Party Computation (MPC) protocol for arithmetic circuitsthat is secure against a static malicious adversary corrupting up to a 1/7 fraction of theparties. The protocol requires each party to send an average of O(mn log 3 n)bits, and computeO(mn log 4 n)operations in a network of size n, where m is the size of circuit. This is achieved byincreasing latency from constant to O(d), where d is the depth of the circuit. Our protocol hasa setup phase that is independent of the circuit and relies on Threshold Fully HomomorphicEncryption (TFHE). The setup requires each party to send Õ(κ) messages and compute Õ(κ)operations, where κ is the security parameter. We provide results from microbenchmarksconducted over a sorting network showing that our protocol may be practical for deploymentin large networks. For example, we consider a network of size 2 (over 33 million) where eachparty has an input item of size 20 bytes. To securely sort the items, our protocol requires eachparty on average to send 5 kilobytes per item sorted.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Technologies and Applications of Secure Multiparty Computation

With the advent of the information age, the network security is particularly important. The secure multiparty computation is a very important branch of cryptography. It is a hotspot in the field of information security. It expanded the scope of the traditional distributed computing and information security, provided a new computing model for the network collaborative computing. First we introdu...

متن کامل

On Secure Two-party Computation

1.1. Secure Two-Party Computation. In essence, secure multiparty computation is the solution to the problem how to compute on private inputs from several parties when we do not trust other parties and we don’t have a central authority who can get inputs, perform computations and give outputs to those that need them. Here we will talk about secure twoparty computation, where Alice, holding xa an...

متن کامل

An Efficient Protocol for Yao?s Millionaires? Problem

The increase in volume and sensitivity of data communicated and processed over the Internet has been accompanied by a corresponding need for e-commerce techniques in which entities can participate in a secure and anonymous fashion. Even simple arithmetic operations over a set of integers partitioned over a network require sophisticated algorithms. As a part of our earlier work, we have develope...

متن کامل

Unconditionally Secure Multiparty Computation and Secret Sharing

We suggest protocols for secure computation of the sum, product, and some other functions of three or more elements of an arbitrary constructible ring, without using any one-way functions. A new input that we offer here is that, in contrast with other proposals, we conceal “intermediate results” of a computation, i.e., we do not let any party accumulate functions of other parties’ private numbe...

متن کامل

New Protocols for Secure Equality Test and Comparison

Protocols for securely comparing private values are among the most fundamental building blocks of multiparty computation. Introduced by Yao under the name millionaire’s problem, they have found numerous applications in a variety of privacy-preserving protocols; however, due to their inherent non-arithmetic structure, existing construction often remain an important bottleneck in large-scale secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014