Title
Optimized Honest-Majority MPC for Malicious Adversaries — Breaking the 1 Billion-Gate Per Second Barrier
Abstract
Secure multiparty computation enables a set of parties to securely carry out a joint computation of their private inputs without revealing anything but the output. In the past few years, the efficiency of secure computation protocols has increased in leaps and bounds. However, when considering the case of security in the presence of malicious adversaries (who may arbitrarily deviate from the protocol specification), we are still very far from achieving high efficiency. In this paper, we consider the specific case of three parties and an honest majority. We provide general techniques for improving efficiency of cut-and-choose protocols on multiplication triples and utilize them to significantly improve the recently published protocol of Furukawa et al. (ePrint 2016/944). We reduce the bandwidth of their protocol down from 10 bits per AND gate to 7 bits per AND gate, and show how to improve some computationally expensive parts of their protocol. Most notably, we design cache-efficient shuffling techniques for implementing cut-and-choose without randomly permuting large arrays (which is very slow due to continual cache misses). We provide a combinatorial analysis of our techniques, bounding the cheating probability of the adversary. Our implementation achieves a rate of approximately 1.15 billion AND gates per second on a cluster of three 20-core machines with a 10Gbps network. Thus, we can securely compute 212,000 AES encryptions per second (which is hundreds of times faster than previous work for this setting). Our results demonstrate that high-throughput secure computation for malicious adversaries is possible.
Year
DOI
Venue
2017
10.1109/SP.2017.15
2017 IEEE Symposium on Security and Privacy (SP)
Keywords
Field
DocType
honest majority MPC optimization,malicious adversaries,secure multiparty computation,secure computation protocols,protocol specification,cut-and-choose protocols,AND gate,cache efficiency shuffling,combinatorial analysis,AES encryptions
Secure multi-party computation,Cryptography,Computer science,Computer security,Cache,Shuffling,Bandwidth (signal processing),Throughput,Secure two-party computation,AND gate
Conference
ISSN
ISBN
Citations 
1081-6011
978-1-5090-5534-0
10
PageRank 
References 
Authors
0.51
14
9
Name
Order
Citations
PageRank
Toshinori Araki1593.62
Assi Barak2162.31
Jun Furukawa3373.02
Tamar Lichter4100.51
Yehuda Lindell54194215.46
Ariel Nof6936.24
Kazuma Ohara7745.34
Adi Watzman8100.51
Or Weinstein9100.51