Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers

Anasuya Acharaya, Carmit Hazay, Vladimir Kolesnikov, Manoj Prabhakaran

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

SCALES (Small Clients And Larger Ephemeral Servers) model is a recently proposed model for MPC (Acharya et al., TCC 2022). While the SCALES model offers several attractive features for practical large-scale MPC, the result of Acharya et al. only offered semi-honest secure protocols in this model. We present a new efficient SCALES protocol secure against malicious adversaries, for general Boolean circuits. We start with the base construction of Acharya et al. and design and use a suite of carefully defined building blocks that may be of independent interest. The resulting protocol is UC-secure without honest majority, with a CRS and bulletin-board as setups, and allows publicly identifying deviations from correct execution.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings
EditorsLeonid Reyzin, Douglas Stebila
PublisherSpringer Science and Business Media Deutschland GmbH
Pages3-38
Number of pages36
ISBN (Print)9783031683992
DOIs
StatePublished - 2024
Event44th Annual International Cryptology Conference, CRYPTO 2024 - Santa Barbara, United States
Duration: 18 Aug 202422 Aug 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14928 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference44th Annual International Cryptology Conference, CRYPTO 2024
Country/TerritoryUnited States
CitySanta Barbara
Period18/08/2422/08/24

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2024.

Keywords

  • Dishonest Majority
  • Malicious Security
  • MPC with Ephemeral Servers
  • Rerandomizable Garbled Circuits
  • SCALES

Fingerprint

Dive into the research topics of 'Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers'. Together they form a unique fingerprint.

Cite this