Abstract
This work describes a three-times (3x) improvement to the performance of secure computation of AES over a network of three parties with an honest majority. The throughput that is achieved is even better than that of computing AES in some scenarios of local (non-private) computation. Theperformance improvementisachieved throughan optimization of the generic secure protocol, and, more importantly, through an optimization of the description of the AES function to support more efficient secure computation, and an optimization of the protocol to the underlying architecture. This demonstrates that the development process of efficient secure computation must include adapting the description of the computed function to be tailored to the protocol, and adapting the implementation of the protocol to the architecture. This work focuses on the secure computation of AES since it has been widely investigated as a de-facto standard performance benchmark for secure computation, and is also important by itself for many applications. Furthermore, parts of the improvements are general and not specific to AES, and can be applied to secure computation of arbitrary functions.
Original language | English |
---|---|
Title of host publication | WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018 |
Publisher | Association for Computing Machinery |
Pages | 13-24 |
Number of pages | 12 |
ISBN (Electronic) | 9781450359870 |
DOIs | |
State | Published - 15 Oct 2018 |
Event | 6th Annual Workshop on Encrypted Computing and Applied Homomorphic Cryptography. WAHC 208, co-located with CCS 2018 - Toronto, Canada Duration: 19 Oct 2018 → … |
Publication series
Name | Proceedings of the ACM Conference on Computer and Communications Security |
---|---|
ISSN (Print) | 1543-7221 |
Conference
Conference | 6th Annual Workshop on Encrypted Computing and Applied Homomorphic Cryptography. WAHC 208, co-located with CCS 2018 |
---|---|
Country/Territory | Canada |
City | Toronto |
Period | 19/10/18 → … |
Bibliographical note
Publisher Copyright:© 2018 Copyright held by the owner/author(s).
Keywords
- Advanced encryption standard
- Secure computation