首页> 外文会议>Annual international conference on the theory and applications of cryptographic techniques >High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
【24h】

High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority

机译:针对恶意对手和诚实多数的高通量安全三方计算

获取原文

摘要

In this paper, we describe a new protocol for secure three-party computation of any functionality, with an honest majority and a malicious adversary. Our protocol has both an information-theoretic and computational variant, and is distinguished by extremely low communication complexity and very simple computation. We start from the recent semi-honest protocol of Araki et al. (ACM CCS 2016) in which the parties communicate only a single bit per AND gate, and modify it to be secure in the presence of malicious adversaries. Our protocol follows the paradigm of first constructing Beaver multiplication triples and then using them to verify that circuit gates are correctly computed. As in previous work (e.g., the so-called TinyOT and SPDZ protocols), we rely on the cut-and-choose paradigm to verify that triples are correctly constructed. We are able to utilize the fact that at most one of three parties is corrupted in order to construct an extremely simple and efficient method of constructing such triples. We also present an improved combinatorial analysis for this cut-and-choose which can be used to achieve improvements in other protocols using this approach.
机译:在本文中,我们描述了一种新的协议,该协议可对任何功能进行安全的三方计算,并且要诚实地多数票和恶意对手。我们的协议具有信息理论和计算方面的变体,并且以极低的通信复杂度和非常简单的计算而著称。我们从Araki等人最近的半诚实协议开始。 (ACM CCS 2016),其中各方在每个AND门之间仅通信一位,并在存在恶意对手的情况下对其进行修改以确保安全。我们的协议遵循以下范例:首先构造Beaver乘法三元组,然后使用它们来验证是否正确计算了电路门。和以前的工作一样(例如所谓的TinyOT和SPDZ协议),我们依靠选择的范式来验证三元组是否正确构建。我们能够利用这样的事实,即最多三个方之一被破坏,以构造一种构造这种三元组的极其简单而有效的方法。我们还为这种选择方式提供了一种改进的组合分析,可用于使用该方法实现其他协议的改进。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号