We present techniques and protocols for the preprocessing of secure multiparty computation (MPC), focusing on the so-called SPDZ MPC scheme  and its derivatives [1,11,13]. These MPC schemes consist of a so-called preprocessing or offline phase where correlated randomness is generated that is independent of the inputs and the evaluated function, and an online phase where such correlated randomness is consumed to securely and efficiently evaluate circuits. In the recent years, it has been shown that such protocols (such as [5,17,18]) turn out to be very efficient in practice. Whilemuch research has been conducted towards optimizing the online phase of the MPC protocols, there seems to have been less focus on the offline phase of such protocols (except for ). With this work, we want to close this gap and give a toolbox of techniques that aim at optimizing the preprocessing. We support both instantiations over small fields and large rings using somewhat homomorphic encryption and the Paillier cryptosystem , respectively. In the case of small fields, we show how the preprocessing overhead can basically be made independent of the field characteristic. In the case of large rings, we present a protocol based on the Paillier cryptosystem which has a lower message complexity than previous protocols and employs more efficient zero-knowledge proofs that, to the best of our knowledge, were not presented in previous work.
|Title of host publication
|Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings
|Mark Manulis, Steve Schneider, Ahmad-Reza Sadeghi
|Number of pages
|Published - 2016
|14th International Conference on Applied Cryptography and Network Security, ACNS 2016 - Guildford, United Kingdom
Duration: 19 Jun 2016 → 22 Jun 2016
|Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|14th International Conference on Applied Cryptography and Network Security, ACNS 2016
|19/06/16 → 22/06/16
Bibliographical notePublisher Copyright:
© Springer International Publishing Switzerland 2016.
- Efficient multiparty computation
- Paillier encryption