High-throughput secure AES computation

Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Benny Pinkas

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations


This work describes a three-times (3x) improvement to the performance of secure computation of AES over a network of three parties with an honest majority. The throughput that is achieved is even better than that of computing AES in some scenarios of local (non-private) computation. Theperformance improvementisachieved throughan optimization of the generic secure protocol, and, more importantly, through an optimization of the description of the AES function to support more efficient secure computation, and an optimization of the protocol to the underlying architecture. This demonstrates that the development process of efficient secure computation must include adapting the description of the computed function to be tailored to the protocol, and adapting the implementation of the protocol to the architecture. This work focuses on the secure computation of AES since it has been widely investigated as a de-facto standard performance benchmark for secure computation, and is also important by itself for many applications. Furthermore, parts of the improvements are general and not specific to AES, and can be applied to secure computation of arbitrary functions.

Original languageEnglish
Title of host publicationWAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018
PublisherAssociation for Computing Machinery
Number of pages12
ISBN (Electronic)9781450359870
StatePublished - 15 Oct 2018
Event6th Annual Workshop on Encrypted Computing and Applied Homomorphic Cryptography. WAHC 208, co-located with CCS 2018 - Toronto, Canada
Duration: 19 Oct 2018 → …

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221


Conference6th Annual Workshop on Encrypted Computing and Applied Homomorphic Cryptography. WAHC 208, co-located with CCS 2018
Period19/10/18 → …

Bibliographical note

Publisher Copyright:
© 2018 Copyright held by the owner/author(s).


  • Advanced encryption standard
  • Secure computation


Dive into the research topics of 'High-throughput secure AES computation'. Together they form a unique fingerprint.

Cite this