Binary AMD circuits from secure multiparty computation

Daniel Genkin, Yuval Ishai, Mor Weiss

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

An AMD circuit over a finite field 𝔽 is a randomized arithmetic circuit that offers the “best possible protection” against additive attacks. That is, the effect of every additive attack that may blindly add a (possibly different) element of 𝔽 to every internal wire of the circuit can be simulated by an ideal attack that applies only to the inputs and outputs. Genkin et al. (STOC 2014, Crypto 2015) introduced AMD circuits as a means for protecting MPC protocols against active attacks, and showed that every arithmetic circuit C over 𝔽 can be transformed into an equivalent AMD circuit of size O(|C|) with O(1/|𝔽|) simulation error. However, for the case of the binary field 𝔽 = 𝔽2, their constructions relied on a tamper-proof output decoder and could only realize a weaker notion of security. We obtain the first constructions of fully secure binary AMD circuits. Given a boolean circuit C and a statistical security parameter σ, we construct an equivalent binary AMD circuit C' of size |C| · polylog(|C|, σ) (ignoring lower order additive terms) with 2 −σ simulation error. That is, the effect of toggling an arbitrary subset of wires can be simulated by toggling only input and output wires. Our construction combines in a general way two types of “simple” honest-majority MPC protocols: protocols that only offer security against passive adversaries, and protocols that only offer correctness against active adversaries. As a corollary, we get a conceptually new technique for constructing active-secure two-party protocols in the OThybrid model, and reduce the open question of obtaining such protocols with constant computational overhead to a similar question in these simpler MPC models.

Original languageEnglish
Title of host publicationTheory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings
EditorsAdam Smith, Martin Hirt
PublisherSpringer Verlag
Pages336-366
Number of pages31
ISBN (Print)9783662536407
DOIs
StatePublished - 2016
Externally publishedYes
Event14th International Conference on Theory of Cryptography, TCC 2016-B - Beijing, China
Duration: 31 Oct 20163 Nov 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9985 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Theory of Cryptography, TCC 2016-B
Country/TerritoryChina
CityBeijing
Period31/10/163/11/16

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2016.

Funding

The second author was supported by ERC starting grant 259426, ISF grant 1709/14, BSF grant 2012378, a DARPA/ARL SAFEWARE award, NSF Frontier Award 1413955, NSF grants 1228984, 1136174, 1118096, and 1065276. This material is based upon work supported by the Defense Advanced Research Projects Agency through the ARL under Contract W911NF-15-C-0205. The views expressed are those of the author and do not reflect the official policy or position of the Department of Defense, the National Science Foundation, or the U.S. Government. The third author was supported by ERC starting grant 259426 and a Check Point Institute for Information Security grant for graduate students and post-doctoral fellows. The first author is a member of the Check Point Institute for Information Security and was supported by ERC starting grant 259426; by the Blavatnik Interdisciplinary Cyber Research Center; by the Israeli Centers of Research Excellence I-CORE program (center 4/11); by the Leona M. & Harry B. Helmsley Charitable Trust; and by NATO’s Public Diplomacy Division in the Framework of “Science for Peace".

FundersFunder number
Check Point Institute for Information Security
Israeli Centers of Research Excellence I-CORE
NATO’s Public Diplomacy Division in the Framework of “Science for Peace
National Science Foundation1228984, 1413955, 1065276, 1118096, 1136174
Defense Advanced Research Projects AgencyW911NF-15-C-0205
Army Research Laboratory
Leona M. and Harry B. Helmsley Charitable Trust
European Research Council259426
United States-Israel Binational Science Foundation2012378
Israel Science Foundation1709/14

    Keywords

    • AMD circuits
    • Algebraic manipulation detection
    • Secure multiparty computation

    Fingerprint

    Dive into the research topics of 'Binary AMD circuits from secure multiparty computation'. Together they form a unique fingerprint.

    Cite this