TinyKeys: A new approach to efficient multi-party computation

Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

20 Scopus citations

Abstract

We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact that within the dishonest majority setting the efficiency of most practical protocols does not depend on the number of honest parties, we investigate how to construct protocols which improve in efficiency as the number of honest parties increases. Our central idea is to take a protocol which is secure for n- 1 corruptions and modify it to use short symmetric keys, with the aim of basing security on the concatenation of all honest parties’ keys. This results in a more efficient protocol tolerating fewer corruptions, whilst also introducing an LPN-style syndrome decoding assumption. We first apply this technique to a modified version of the semi-honest GMW protocol, using OT extension with short keys, to improve the efficiency of standard GMW with fewer corruptions. We also obtain more efficient constant-round MPC, using BMR-style garbled circuits with short keys, and present an implementation of the online phase of this protocol. Our techniques start to improve upon existing protocols when there are around n= 20 parties with h= 6 honest parties, and as these increase we obtain up to a 13 times reduction (for n= 400, h= 120) in communication complexity for our GMW variant, compared with the best-known GMW-based protocol modified to use the same threshold.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings
EditorsHovav Shacham, Alexandra Boldyreva
PublisherSpringer Verlag
Pages3-33
Number of pages31
ISBN (Print)9783319968773
DOIs
StatePublished - 2018
Event38th Annual International Cryptology Conference, CRYPTO 2018 - Santa Barbara, United States
Duration: 19 Aug 201823 Aug 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10993 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference38th Annual International Cryptology Conference, CRYPTO 2018
Country/TerritoryUnited States
CitySanta Barbara
Period19/08/1823/08/18

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2018.

Funding

We first apply this technique to a modified version of the semi-honest GMW protocol, using OT extension with short keys, to improve the efficiency of standard GMW with fewer corruptions. We also obtain more efficient constant-round MPC, using BMR-style garbled circuits with short keys, and present an implementation of the online phase of this protocol. Our techniques start to improve upon existing protocols when there are around n = 20 parties with h = 6 honest parties, and as these increase we obtain up to a 13 times reduction (for n = 400,h = 120) C. Hazay—Supported by the European Research Council under the ERC consolidators grant agreement No. 615172 (HIPS), and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. E. Orsini—Supported in part by ERC Advanced Grant ERC-2015-AdG-IMPaCT. P. Scholl—Supported by the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731583 (SODA), and the Danish Independent Research Council under Grant-ID DFF-6108-00169 (FoCC). E. Soria-Vazquez—Supported by the European Union’s Horizon 2020 research and innovation programme under the Marie Sk lodowska-Curie grant agreement No. 643161, and by ERC Advanced Grant ERC-2015-AdG-IMPaCT. C. Hazay—Supported by the European Research Council under the ERC consolidators grant agreement No. 615172 (HIPS), and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. E. Orsini—Supported in part by ERC Advanced Grant ERC-2015-AdG-IMPaCT. P. Scholl—Supported by the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731583 (SODA), and the Danish Independent Research Council under Grant-ID DFF-6108-00169 (FoCC). E. Soria-Vazquez—Supported by the European Union’s Horizon 2020 research and innovation programme under the Marie Sk̷lodowska-Curie grant agreement No. 643161, and by ERC Advanced Grant ERC-2015-AdG-IMPaCT.

FundersFunder number
FoCC
Marie Sk lodowska-Curie
SODA
Natur og Univers, Det Frie ForskningsrådDFF-6108-00169
Horizon 2020 Framework Programme690978, 731583
European CommissionERC-2015-AdG-IMPaCT
Horizon 2020643161

    Fingerprint

    Dive into the research topics of 'TinyKeys: A new approach to efficient multi-party computation'. Together they form a unique fingerprint.

    Cite this