【24h】

Efficient Maliciously Secure Multiparty Computation for RAM

机译:高效的RAM的恶意安全多群计算

获取原文

摘要

A crucial issue, that mostly affects the performance of actively secure computation of RAM programs, is the task of reading/writing from/to memory in a private and authenticated manner. Previous works in the active security and multiparty settings are based purely on the SPDZ (reactive) protocol, hence, memory accesses are treated just like any input to the computation. However, a garbled-circuit-based construction (such as BMR), which benefits from a lower round complexity, must resolve the issue of converting memory data bits to their corresponding wire keys and vice versa. In this work we propose three techniques to construct a secure memory access, each appropriates to a different level of abstraction of the underlying garbling functionality. We provide a comparison between the techniques by several metrics. To the best of our knowledge, we are the first to construct, prove and implement a concretely efficient garbled-circuit-based actively secure RAM computation with dishonest majority. Our construction is based on our third (most efficient) technique, cleverly utilizing the underlying SPDZ authenticated shares (Damgard et al., Crypto 2012), yields lean circuits and a constant number of communication rounds per physical memory access. Specifically, it requires no additional circuitry on top of the ORAM's, incurs only two rounds of broadcasts between every two memory accesses and has a multiplicative overhead of 2 on top of the ORAM's storage size. Our protocol outperforms the state of the art in this settings when deployed over WAN. Even when simulating a very conservative RTT of 100 ms our protocol is at least one order of magnitude faster than the current state of the art protocol of Keller and Scholl (Asiacrypt 2015).
机译:至关重要的问题,主要影响积极安全计算RAM程序的性能,这是以私有和经过身份验证的方式从/写入存储器的任务。以前的工作在主动安全性和多方面设置纯粹基于SPDZ(无功)协议,因此,内存访问就像对计算的任何输入一样处理。然而,从较低的圆形复杂度受益的基于乱码的基于电路的结构(例如BMR),必须解决将存储器数据比特转换为相应的线键的问题,反之亦然。在这项工作中,我们提出了三种构建安全内存访问的技术,每个技术都适用于底层摇摇欲坠功能的不同抽象水平。我们提供了几个指标技术之间的比较。据我们所知,我们是第一个构造,证明和实施基于具体高效的乱码电路的积极保护RAM计算,以不诚实的多数。我们的施工基于我们的第三种(最有效的)技术,巧妙地利用底层SPDZ经过身份验证的股票(Damgard等,2012年),产生瘦电路和每个物理内存访问的恒定通信轮数。具体而言,在ORAM之上,它不需要额外的电路,在每两个存储器访问中只引发两轮广播,并且在ORAM的存储大小之上具有2的乘法开销。在通过WAN部署时,我们的协议在此设置中优于本设置中的最新状态。即使在模拟100 ms的非常保守的RTT时,我们的协议也比凯勒和Scholl(Asiancrypt 2015)的最新状态快至少一个数量级。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号