Putting the Online Phase on a Diet: Covert Security from Short MACs

Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

An important research direction in secure multi-party computation (MPC) is to improve the efficiency of the protocol. One idea that has recently received attention is to consider a slightly weaker security model than full malicious security – the so-called setting of covert security. In covert security, the adversary may cheat but only is detected with certain probability. Several works in covert security consider the offline/online approach, where during a costly offline phase correlated randomness is computed, which is consumed in a fast online phase. State-of-the-art protocols focus on improving the efficiency by using a covert offline phase, but ignore the online phase. In particular, the online phase is usually assumed to guarantee security against malicious adversaries. In this work, we take a fresh look at the offline/online paradigm in the covert security setting. Our main insight is that by weakening the security of the online phase from malicious to covert, we can gain significant efficiency improvements during the offline phase. Concretely, we demonstrate our technique by applying it to the online phase of the well-known TinyOT protocol (Nielsen et al., CRYPTO ’12). The main observation is that by reducing the MAC length in the online phase of TinyOT to t bits, we can guarantee covert security with a detection probability of 1-12t. Since the computation carried out by the offline phase depends on the MAC length, shorter MACs result in a more efficient offline phase and thus speed up the overall computation. Our evaluation shows that our approach reduces the communication complexity of the offline protocol by at least 35% for a detection rate up to 78. In addition, we present a new generic composition result for analyzing the security of online/offline protocols in terms of concrete security.

Original languageEnglish
Title of host publicationTopics in Cryptology – CT-RSA 2023 - Cryptographers’ Track at the RSA Conference 2023, Proceedings
EditorsMike Rosulek
PublisherSpringer Science and Business Media Deutschland GmbH
Pages360-386
Number of pages27
ISBN (Print)9783031308710
DOIs
StatePublished - 2023
EventCryptographers’ Track at the RSA Conference, CT-RSA 2023 - San Francisco, United States
Duration: 24 Apr 202327 Apr 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13871 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceCryptographers’ Track at the RSA Conference, CT-RSA 2023
Country/TerritoryUnited States
CitySan Francisco
Period24/04/2327/04/23

Bibliographical note

Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

Funding

Acknowledgments. The first, third, and fourth authors were supported by the German Federal Ministry of Education and Research (BMBF) iBlockchain project (grant nr. 16KIS0902), by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) SFB 1119 - 236615297 (CROSSING Project S7), and by the BMBF and the Hessian Ministry of Higher Education, Research, Science and the Arts within their joint support of the National Research Center for Applied Cybersecurity ATHENE. The second author was supported by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office, and by ISF grant No. 1316/18.

FundersFunder number
Hessian Ministry of Higher Education, Research, Science and the Arts
National Research Center for Applied Cybersecurity ATHENE
Deutsche ForschungsgemeinschaftSFB 1119 - 236615297
Bundesministerium für Bildung und Forschung16KIS0902
Israel Science Foundation1316/18

    Keywords

    • Covert Security
    • Deterrence Composition
    • Multi-Party Computation (MPC)
    • Offline/Online

    Fingerprint

    Dive into the research topics of 'Putting the Online Phase on a Diet: Covert Security from Short MACs'. Together they form a unique fingerprint.

    Cite this