Amortized Complexity of Information- Theoretically Secure MPC - - PowerPoint PPT Presentation

amortized complexity of information theoretically secure
SMART_READER_LITE
LIVE PREVIEW

Amortized Complexity of Information- Theoretically Secure MPC - - PowerPoint PPT Presentation

Amortized Complexity of Information- Theoretically Secure MPC Revisited Ignacio Cascudo 1 Ronald Cramer 2 , 3 Chaoping Xing 4 Chen Yuan 2 1 Aalborg University 2 CWI Amsterdam 3 Leiden University 4 NTU Singapore CRYPTO, 22 August 2018 Secure


slide-1
SLIDE 1

Amortized Complexity of Information- Theoretically Secure MPC Revisited

Ignacio Cascudo 1 Ronald Cramer 2,3 Chaoping Xing 4 Chen Yuan 2

1Aalborg University 2CWI Amsterdam 3Leiden University 4NTU Singapore

CRYPTO, 22 August 2018

slide-2
SLIDE 2

Secure multiparty computation (MPC)

xn

x4

x3 x2 x1

...

y=f (x1,..., xn)

slide-3
SLIDE 3

Secret-sharing based MPC

x1 x2 xn y=f (x1,..., xn) ...

C

Arithmetic circuit over Fq G

[x1] [x2] [xn]

[a] [b] [G(a,b)]

[ y]

... ... [.]:Linear secret sharing scheme over Fq ◮ Function represented by arithmetic circuit over some field Fq. ◮ Parties secret-share inputs. ◮ Gate-by-gate computation ([a], [b] → [G(a, b)])

◮ Linear gates: using linearity of secret sharing. ◮ Multiplication gates: Dedicated subprotocol.

slide-4
SLIDE 4

Motivation

Many secret-sharing-based MPC protocols need large finite fields.

slide-5
SLIDE 5

Motivation

Many secret-sharing-based MPC protocols need large finite fields. For example:

◮ Use of Shamir’s scheme (BGW88 and many others) ◮ Use of hyperinvertible matrices (Beerliova-Hirt 08) ◮ Use of message authentication codes (SPDZ)

slide-6
SLIDE 6

Motivation

How can we use those protocols for computing arithmetic circuits over small fields (e.g. q = 2)?.

slide-7
SLIDE 7

Motivation

How can we use those protocols for computing arithmetic circuits over small fields (e.g. q = 2)?.

◮ Standard solution: Consider each input ∈ F2 as an element of a large

extension field F2m, use protocol for F2m.

slide-8
SLIDE 8

Motivation

How can we use those protocols for computing arithmetic circuits over small fields (e.g. q = 2)?.

◮ Standard solution: Consider each input ∈ F2 as an element of a large

extension field F2m, use protocol for F2m.

◮ Problem: Seems wasteful.

slide-9
SLIDE 9

Motivation

How can we use those protocols for computing arithmetic circuits over small fields (e.g. q = 2)?.

◮ Standard solution: Consider each input ∈ F2 as an element of a large

extension field F2m, use protocol for F2m.

◮ Problem: Seems wasteful. ◮ Can we get more out of this?.

slide-10
SLIDE 10

Goal

We want to securely compute k > 1 parallel evaluations of the binary circuit... ...by using one execution of the arithmetic MPC protocol over F2m plus "cheaper" steps (in terms of communication complexity).

slide-11
SLIDE 11

Goal

We want to securely compute k > 1 parallel evaluations of the binary circuit... ...by using one execution of the arithmetic MPC protocol over F2m plus "cheaper" steps (in terms of communication complexity). More concretely, we focus on information-theoretically perfectly secure MPC. We consider Beerliova-Hirt 08 as “arithmetic” MPC protocol.

slide-12
SLIDE 12

BH08 result / Our result

BH08

There exists an information-theoretically perfectly secure n-party MPC protocol for an arithmetic circuit over F2m, 2m > 2n, which

◮ Is secure against ⌊(n − 1)/3⌋ active corruptions (optimal). ◮ Has communication complexity of O(n) field elements per gate.

slide-13
SLIDE 13

BH08 result / Our result

BH08

There exists an information-theoretically perfectly secure n-party MPC protocol for an arithmetic circuit over F2m, 2m > 2n, which

◮ Is secure against ⌊(n − 1)/3⌋ active corruptions (optimal). ◮ Has communication complexity of O(n) field elements per gate.

Our main result (Theorem 1:)

There exists a n-party MPC protocol for any boolean circuit which

◮ Is secure against ⌊(n − 1)/3⌋ active corruptions (optimal). ◮ Computes Ω(log n) evaluations in parallel. ◮ Has communication complexity of O(n) bits per gate per instance.

slide-14
SLIDE 14

Results

◮ Using packed secret-sharing cannot achieve this, as it can not attain

⌊(n − 1)/3⌋ corruption tolerance.

◮ In fact we can combine our techniques with packed secret sharing and obtain:

slide-15
SLIDE 15

Results

◮ Using packed secret-sharing cannot achieve this, as it can not attain

⌊(n − 1)/3⌋ corruption tolerance.

◮ In fact we can combine our techniques with packed secret sharing and obtain:

Result 2: for every ǫ > 0, a n-party MPC protocol for any boolean circuit

◮ Secure against t < (1 − ǫ)n/3 active corruptions. ◮ Computes Ω(n log n) evaluations in parallel. ◮ Amortized communication complexity of O(1) bits per gate per instance.

slide-16
SLIDE 16

Goal

x11, x12 ,..., x1k x21, x22,..., x2k xn1, xn2,..., xnk y1 , y2,..., yk

Binary circuit

C

y1=C (x11, x21,..., xn1) y2=C(x12, x22 ,..., xn 2) yk=C (x1k , x2k ,..., xnk)

... ... X 1 X 2 X n

Arithmetic circuit

  • ver GF(2m)

C'

Y =C ' (X 1,..., X n) ...

Computed by protocol π'

Resource

slide-17
SLIDE 17

Obstacle

(Fk

2, +), (F2k, +) isomorphic as Fq-vector spaces, but

(Fk

2, +, ∗),(F2k, +, ·) not isomorphic as Fq-algebras for k > 1.

(where ∗ is Schur product in Fk

2, and · is field product in F2k).

slide-18
SLIDE 18

Reverse multiplication-friendly embeddings

Next best thing: reverse multiplication-friendly embeddings (RMFE) A (k, m)2-RMFE is a pair (φ,ψ) where

◮ φ : Fk 2 → F2m is F2-linear. ◮ ψ : F2m → Fk 2 is F2-linear. ◮ For all x, y ∈ Fk 2,

x ∗ y = ψ(φ(x) · φ(y)) Remark: φ is invertible, but ψ = φ−1.

slide-19
SLIDE 19

History

Multiplication-friendly embeddings (Fk

2 and F2m swapped): ◮ Introduced in MPC in CCCX09 ◮ "Bilinear multiplication algorithms" (Chud 86)

Reverse multiplication-friendly embeddings

◮ Can be used to improve CCCX09 (unpublished) ◮ BMN17 ◮ This paper ◮ BMN18

slide-20
SLIDE 20

Constructions

[Remember a (k, m)2-RMFE embeds Fk

2 into F2m] ◮ Asymptotical:

There exist families of (k, O(k))2-RMFE. Algebraic geometric construction.

slide-21
SLIDE 21

Constructions

[Remember a (k, m)2-RMFE embeds Fk

2 into F2m] ◮ Asymptotical:

There exist families of (k, O(k))2-RMFE. Algebraic geometric construction.

◮ Non-asymptotical:

For all r ≤ 33, there exists a (3r, 10r − 5)2-RMFE. Polynomial interpolation-based construction (e.g. we can embed F99

2 into

F2325).

slide-22
SLIDE 22

How to use RMFEs

C'

Y ...

x1=(x11, x12,..., x1k) x2=(x21, x22,..., x2k) xn=(xn1, xn2,..., xnk) ϕ(x1) ϕ(xn) ϕ(x2)

ϕ

−1(Y )

GF(2m)

(several modifications w.r.t. C).

◮ Invariant: all intermediate values are sharings of φ-encodings. ◮ We decode the output with the inverse φ−1 (not with ψ).

slide-23
SLIDE 23

Main circuit modification

a

GF(2) GF(2m)

a⋅b b B A

. .

ϕ∘ψ ϕ∘ψ(A⋅B)

AND

slide-24
SLIDE 24

Main circuit modification explained

GF(2m)

ϕ(b) ϕ(a)

.

ϕ∘ψ ϕ(ψ(ϕ(a)⋅ϕ(b)))=ϕ(a∗b)

slide-25
SLIDE 25

Obstacles

  • 1. How do we (efficiently) process the (φ ◦ ψ)-gates?
  • 2. How do we guarantee that parties input φ-encodings?

C'

Y ...

x1=(x11, x12,..., x1k) x2=(x21, x22,..., x2k) xn=(xn1, xn2,..., xnk) ϕ(x1) ϕ(xn) ϕ(x2)

ϕ

−1(Y )

GF(2m)

(several modifications w.r.t. C).

slide-26
SLIDE 26

Random sharings in F2-linear subspaces

These can be reduced to the following problem: "Given a F2-linear subspace V ⊆ (F2m)ℓ, generate [R1], . . . , [Rℓ] for (R1, . . . , Rℓ) ∈R V."

slide-27
SLIDE 27

Random sharings in F2-linear subspaces

These can be reduced to the following problem: "Given a F2-linear subspace V ⊆ (F2m)ℓ, generate [R1], . . . , [Rℓ] for (R1, . . . , Rℓ) ∈R V." Hyper-invertible matrices (BH08):

◮ Would work if V were a F2m-linear subspace ◮ But do not work directly for F2-linear subspaces.

slide-28
SLIDE 28

Random sharings in F2-linear subspaces

These can be reduced to the following problem: "Given a F2-linear subspace V ⊆ (F2m)ℓ, generate [R1], . . . , [Rℓ] for (R1, . . . , Rℓ) ∈R V." Hyper-invertible matrices (BH08):

◮ Would work if V were a F2m-linear subspace ◮ But do not work directly for F2-linear subspaces.

Solution: Apply HIM-based protocol to the tensor product F2m ⊗ V.

◮ F2m ⊗ V is a F2m-vector space. ◮ We can see its elements as vectors from V m.

slide-29
SLIDE 29

Conclusions

We present:

◮ A methodology to securely evaluating several instances in parallel of a circuit

  • ver a small field, by using a SSS-based MPC for a large field.

◮ An extension of the results from BH08 to small fields (in an amortized sense). ◮ Main technical handle: Reverse multiplication-friendly embeddings.

Future work:

◮ Extending these results to other models (e.g. dishonest majority).