Carmit Hazay, Emmanuela Orsini, Peter Scholl and Eduardo Soria-Vazquez
Concretely Efficient La Large-Sc Scale M MPC wi with th Acti - - PowerPoint PPT Presentation
Concretely Efficient La Large-Sc Scale M MPC wi with th Acti - - PowerPoint PPT Presentation
Concretely Efficient La Large-Sc Scale M MPC wi with th Acti tive Securi rity ty (or (or, Ti TinyKeys fo for Ti TinyOT) ) Carmit Hazay, Emmanuela Orsini, Peter Scholl and Eduardo Soria-Vazquez La Large-Sc Scale MP MPC Current
La Large-Sc Scale MP MPC
Growing number of users want to compute privately and jointly.
Current practical MPC doesnβt scale well for large numbers
- f parties.
Outsource?
Fixed set
- f parties
Sample a committee
1229 farmers (auction) +6000 relays (statistics)
Eduardo Soria-Vazquez 2
MP MPC C setting in this talk
Main focus:
- Concrete efficiency for large numbers of parties
(e.g. π in 10s, 100s). Adversary:
- Static, active.
- Dishonest majority, but not full threshold!
- Assume β > 1 honest parties to increase efficiency.
Model of Computation:
- Boolean circuits.
- Preprocessing phase.
Preprocessing Online a b c d
corr. rand.
3 Eduardo Soria-Vazquez
Ou Our resu sults
New TinyOT-style protocol (actively secure, dishonest majority) exploiting more honest parties:
v Up to 34x less communication compared with [WRK17]βs TinyOT with π β 1 corruptions. v Up to 18x less communication compared with [WRK17]βs TinyOT mixed with committees (β > 1 honest parties). v Good improvements (2-6x less comm) with just 10% honest parties.
4 Eduardo Soria-Vazquez
Ho How to to scale ale Tin inyOT
Th The Ti TinyOT pr protocol [NNOB12]
Eduardo Soria-Vazquez 6
- Based on additive secret sharing: π¦ = π¦) + π¦+.
- Multiplications computed using Beaverβs triples: (π², π³, π²π³).
- Active security: Information-theoretic MACs (authenticated bits).
Th The Ti TinyOT pr protocol [NNOB12]
Eduardo Soria-Vazquez 7
π¦) β {0,1} π π¦) β 0,1 )+4
β, π π¦) β 0,1 )+4
π[π¦)] = π[π¦)] + π¦) Β· β
- Based on additive secret sharing: π¦ = π¦) + π¦+.
- Multiplications computed using Beaverβs triples: (π², π³, π²π³).
- Active security: Information-theoretic MACs (authenticated bits).
π¦), π π¦)
Th The Ti TinyOT pr protocol [NNOB12]
Eduardo Soria-Vazquez 8
π¦+ β {0,1} π π¦+ β 0,1 )+4
β, π π¦+ β 0,1 )+4
π[π¦+] = π[π¦+] + π¦+ Β· β
- Based on additive secret sharing: π¦ = π¦) + π¦+.
- Multiplications computed using Beaverβs triples: (π², π³, π²π³).
- Active security: Information-theoretic MACs (authenticated bits).
π¦+, π π¦+
Mu Multi-Pa Party Ti TinyOT
Eduardo Soria-Vazquez 9
Th The Ti TinyOT pr protocol [NNOB12]
Eduardo Soria-Vazquez 10
π¦) β {0,1} π π¦) β 0,1 )+4
β, π π¦) β 0,1 )+4
π[π¦)] = π[π¦)] + π¦) Β· β
- Based on additive secret sharing: π¦ = π¦) + π¦+.
- Multiplications computed using Beaverβs triples: (π², π³, π²π³).
- Active security: Information-theoretic MACs (authenticated bits).
π¦) + 1, π π¦) + β
Th The Ti TinyOT pr protocol [NNOB12]
Eduardo Soria-Vazquez 11
π¦) β {0,1} π π¦) β 0,1 β
β, π π¦) β 0,1 β
π[π¦)] = π[π¦)] + π¦) Β· β
- Based on additive secret sharing: π¦ = π¦) + π¦+.
- Multiplications computed using Beaverβs triples: (π², π³, π²π³).
- Active security: Information-theoretic MACs (authenticated bits).
π¦) + 1, β βͺ 128 π π¦) + β
π[π¦)] = π[π¦)] + π¦) Β· β
Th The Ti TinyOT pr protocol [NNOB12]
Eduardo Soria-Vazquez 12
π¦) β {0,1} π π¦) β 0,1 β
β, π π¦) β 0,1 β
- Based on additive secret sharing: π¦ = π¦) + π¦+.
- Multiplications computed using Beaverβs triples: (π², π³, π²π³).
- Active security: Information-theoretic MACs (authenticated bits).
β βͺ 128 β Β· β β₯ π‘ β, π π¦) β 0,1 β
Co Commi mmittees s + + Ti TinyOT + + Short Keys
Eduardo Soria-Vazquez 13
Co Commi mmittees s + + Ti TinyOT + + Short Keys
Eduardo Soria-Vazquez 14
Short keys h honest Additive shares 1 honest
15
Th The problem with short MACs
π Γ Triple (π², π³, π²π³)
Eduardo Soria-Vazquez
π³ β 0,1 B π² β 0,1 B π¦)π§) + π‘), β¦ , π¦Bπ§B + π‘B
π π β πΌ β + π
π¦), β¦ , π¦B β 0,1 π π¦) , β¦ , π π¦B β 0,1 β π‘), β¦ , π‘B β π±( 0,1 ) π§), β¦ , π§B β {0,1} β β 0,1 β π π¦) , β¦ , π π¦B β 0,1 β
π‘), β¦ , π‘B
Only πβ possible values for π¬ ! β as small as 1 !
16
Leakage gets worseβ¦ β¦
π Γ Triple (π², π³, π²π³)
Eduardo Soria-Vazquez
π Γ Triple (π², π³, π²π³)
, . . . ,
π ππ + β― + ππ = S πΌ βπ +
- VW) ..X
ππ β
ππ ππ π π
π ππ β πΌ β) + ππ π ππ β πΌ βX + ππ
Wha What is s Ti TinyKeys? ? [HO HOSS18] 18]
- New tool for large-scale MPC (more honesty β shorter keys).
- Base security on the concatenation of honest partiesβ keys.
- Security reduces to Regular Syndrome Decoding:
- Not much easier than Syndrome Decoding β LPN.
- Params: # products π , key length β, # honest parties β.
- Statistically hard for small π /large β.
Eduardo Soria-Vazquez 17
[Saa07] [BM17] [MO15] [NCB11] [BLN+09] [Kir11] [CJ04] [FS09] [MMT11] [BJMM12] [BLP08] [BLP11] [MS09]
Wha What is s Ti TinyKeys? ? [HO HOSS18] 18]
- New tool for large-scale MPC (more honesty β shorter keys).
- Base security on the concatenation of honest partiesβ keys.
- Security reduces to Regular Syndrome Decoding:
- Not much easier than syndrome decoding β LPN.
- Params: # products π , key length β, # honest parties β.
- Statistically hard for small π /large β.
Eduardo Soria-Vazquez 18
- Params: # products π , key length β, # honest parties β.
Pr Problems with Ti TinyKeys [H [HOSS18] 18]
- Params: # products π, key length β, # honest parties β.
- A single β can only be used to produce r triples!
- Solution: Use different ones for every r triples: β[^,B), β[B,+B), β¦
Secure method for switching: β ^,B β β, β[B,+B)β β , β¦
- Best bucketing technique cannot apply (mult. overhead: πΆ).
- Solution: Use previous bucketing techniques (mult. overhead: B+).
- Still worth! πΆ β {3,4} in practice.
Eduardo Soria-Vazquez 19
Pr Problems with Ti TinyKeys [H [HOSS18] 18]
Co Commu mmunication comp mplexity y (400 (400 part rties) s)
20 50 100 150 200 250 300 350 1 10 20 30 40 50 60 70 80 90 100 110 120
- Comm. (megabits/AND triple)
# honest parties
Standard [WRK17] [WRK17] + Committee This Work Eduardo Soria-Vazquez
Co Conclusi sion and fu future directions
- First extension of TinyKeys [HOSS18] to the active setting.
- Take-away: Large-scale requires different/new techniques (bucketing, MACs).
- Improved TinyOT with 30+ parties.
- Up to 18x in communication (vs multiparty [WRK17] + committees).
- Significant improvements (2-6x) with as little as 10% honest parties.
Future challenges:
- Optimize TinyKeys: More cryptanalysis (conservative parameters atm).
- Adaptive adversaries? Actively secure TinyKeys-BMR [HOSS18]?
21 Eduardo Soria-Vazquez
Th Thank you! Questions?
Eduardo Soria-Vazquez 22
https://ia.cr/2018/843 [Full version] Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT) Carmit Hazay, Emmanuela Orsini, Peter Scholl and Eduardo Soria-Vazquez eduardo.soria-vazquez@bristol.ac.uk Paper: Mail: