首页> 外文会议>Annual International Cryptology Conference >Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits
【24h】

Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits

机译:高效的多方计算:通过安全SIMD电路从被动到活动安全性

获取原文

摘要

A central problem in cryptography is that of converting protocols that offer security against passive (or semi-honest) adversaries into ones that offer security against active (or malicious) adversaries. This problem has been the topic of a large body of work in the area of secure multiparty computation (MPC). Despite these efforts, there are still big efficiency gaps between the best protocols in these two settings. In two recent works, Genkin et al. (STOC 2014) and Ikarashi et al. (ePrint 2014) suggested the following new paradigm for efficiently transforming passive-secure MPC protocols into active-secure ones. They start by observing that in several natural information-theoretic MPC protocols, an arbitrary active attack on the protocol can be perfectly simulated in an ideal model that allows for additive attacks on the arithmetic circuit being evaluated. That is, the simulator is allowed to (blindly) modify the original circuit by adding an arbitrary field element to each wire. To protect against such attacks, the original circuit is replaced by a so-called AMD circuit, which can offer protection against such attacks with constant multiplicative overhead to the size. Our motivating observation is that in the most efficient known information-theoretic MPC protocols, which are based on packed secret sharing, it is not the case that general attacks reduce to additive attacks. Instead, the corresponding ideal attack can include limited forms of linear combinations of wire values. We extend the AMD circuit methodology to so-called secure SIMD circuits, which offer protection against this more general class of attacks. We apply secure SIMD circuits to obtain several asymptotic and concrete efficiency improvements over the current state of the art. In particular, we improve the additive per-layer overhead of the current best protocols from O(n~2) to O(n), where n is the number of parties, and obtain the first protocols based on packed secret sharing that "natively" achieve near-optimal security without incurring the high concrete cost of Bracha's committee-based security amplification method. Our analysis is based on a new modular framework for proving reductions from general attacks to algebraic attacks. This framework allows us to reprove previous results in a conceptually simpler and more unified way, as well as obtain our new results.
机译:密码术中的核心问题是将提供安全性(或半诚实)对手提供安全性的协议,该协议将安全性(或半诚实)对抗提供安全性(或恶意)对手的安全性。这个问题一直是安全多方计算(MPC)领域的大型工作的主题。尽管有这些努力,但这两个设置中最好的协议之间仍有很大的效率差距。在最近的两个作品中,Genkin等人。 (STOC 2014)和Ikarashi等人。 (ePrint 2014)建议以下新的范例,用于将被动安全的MPC协议有效地转换为主动安全的PAC协议。它们首先观察到,在几种自然信息 - 理论MPC协议中,可以在允许评估算术电路上的附加攻击的理想模型中完美地模拟协议上的任意主动攻击。也就是说,允许模拟器(盲目地)通过向每个电线添加任意字段元素来修改原始电路。为了防止这种攻击,原始电路由所谓的AMD电路取代,可以提供对恒定乘法开销的这种攻击来提供保护。我们的激励观察是,在最有效的已知信息理论MPC协议中,这是基于包装的秘密共享,因此常规攻击降低到附加攻击并非如此。相反,相应的理想攻击可以包括有限形式的线性线性组合的线值。我们将AMD电路方法扩展到所谓的安全SIMD电路,该电路提供防止这种更普遍的攻击。我们应用安全的SIMD电路,以获得多个渐近和具体效率的提高,而不是本领域的现有状态。特别是,我们改善了来自O(n〜2)到O(n)的当前最佳协议的添加剂每层开销,其中n是各方的数量,并根据包装的秘密共享“本地”的秘密共享获得第一协议“实现近乎最佳安全性,而不会产生基于Bracha委员会的安全放大方法的高具体成本。我们的分析基于新的模块化框架,用于从一般攻击到代数攻击的缩减。此框架允许我们以概念上更简单和更统一的方式责备以前的结果,并获得新的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号