Round-Optimal Secure Multiparty Computation with Honest Majority - - PowerPoint PPT Presentation

round optimal secure multiparty computation with honest
SMART_READER_LITE
LIVE PREVIEW

Round-Optimal Secure Multiparty Computation with Honest Majority - - PowerPoint PPT Presentation

Round-Optimal Secure Multiparty Computation with Honest Majority Prabhanjan Ananth Arka Rai Choudhuri Aarushi Goel Abhishek Jain CRYPTO 2018 Secure Multiparty Computation ! # ! $ ! " ! % Secure Multiparty Computation Securely compute


slide-1
SLIDE 1

Round-Optimal Secure Multiparty Computation with Honest Majority

Prabhanjan Ananth Arka Rai Choudhuri Aarushi Goel Abhishek Jain

CRYPTO 2018

slide-2
SLIDE 2

Secure Multiparty Computation

!" !# !$ !%

slide-3
SLIDE 3

Secure Multiparty Computation

!" !# !$ !%

Securely compute &(!", !#, !$, !%)

slide-4
SLIDE 4

Secure Multiparty Computation

!" !# !$ !%

Compute &(!", !#, !$, !%) Adversary doesn’t learn anything beyond &(!", !#, !$, !%)

slide-5
SLIDE 5

Honest Majority MPC

slide-6
SLIDE 6

Honest Majority MPC (up to ! < #/2 corrupted parties)

slide-7
SLIDE 7

Honest Majority MPC (up to ! < #/2 corrupted parties)

  • Oblivious Transfer is not necessary.

Necessary for dishonest majority [Kil88].

  • Fairness and Guaranteed output delivery can be achieved.
  • UC security without external trusted setups
  • Round complexity lower bounds of dishonest majority do not apply.

4 rounds necessary for dishonest majority in the plain model [Garg- Mukherjee-Pandey-Polychroniadou16]

slide-8
SLIDE 8

Honest Majority MPC (up to ! < #/2 corrupted parties)

  • Oblivious Transfer is not necessary.

Necessary for dishonest majority [Kil88].

  • Fairness and Guaranteed output delivery can be achieved.
  • UC security without external trusted setups
  • Round complexity lower bounds of dishonest majority do not apply.

4 rounds necessary for dishonest majority in the plain model [Garg- Mukherjee-Pandey-Polychroniadou16]

slide-9
SLIDE 9

Honest Majority MPC (up to ! < #/2 corrupted parties)

  • Oblivious Transfer is not necessary.

Necessary for dishonest majority [Kil88].

  • Fairness and Guaranteed output delivery can be achieved.
  • UC security without external trusted setups
  • Round complexity lower bounds of dishonest majority do not apply.

4 rounds necessary for dishonest majority in the plain model [Garg- Mukherjee-Pandey-Polychroniadou16]

slide-10
SLIDE 10

Honest Majority MPC (up to ! < #/2 corrupted parties)

  • Oblivious Transfer is not necessary.

Necessary for dishonest majority [Kil88].

  • Fairness and Guaranteed output delivery can be achieved.
  • UC security without external trusted setups
  • Round complexity lower bounds of dishonest majority do not apply.

4 rounds necessary for dishonest majority in the plain model [Garg- Mukherjee-Pandey-Polychroniadou16]

slide-11
SLIDE 11

Problem Statement

What is the exact round complexity of honest majority MPC in the plain model?

slide-12
SLIDE 12

Honest Majority MPC: Security Notions

slide-13
SLIDE 13

Honest Majority MPC: Security Notions

  • Security with Abort:
slide-14
SLIDE 14

Honest Majority MPC: Security Notions

  • Security with Abort:

Adversary may learn the output but can prevent honest parties from doing so.

slide-15
SLIDE 15

Honest Majority MPC: Security Notions

  • Security with Abort:
  • Guaranteed output Delivery:

Adversary may learn the output but can prevent honest parties from doing so.

slide-16
SLIDE 16

Honest Majority MPC: Security Notions

  • Security with Abort:
  • Guaranteed output Delivery:

Adversary may learn the output but can prevent honest parties from doing so. Honest parties always learn the output even if some parties abort prematurely.

slide-17
SLIDE 17

Honest Majority MPC: Security Notions

  • Security with Abort:
  • Guaranteed output Delivery:

Adversary may learn the output but can prevent honest parties from doing so. Honest parties always learn the output even if some parties abort prematurely. Guaranteed output delivery ⟹ Fairness

slide-18
SLIDE 18

Honest Majority MPC: Security Notions

  • Security with Abort:
  • Guaranteed output Delivery:

Adversary may learn the output but can prevent honest parties from doing so. Honest parties always learn the output even if some parties abort prematurely. Guaranteed output delivery ⟹ Fairness

Goal: Develop round optimal protocols in these settings.

slide-19
SLIDE 19

Brief History: Security with Abort

slide-20
SLIDE 20

Brief History: Security with Abort

Polynomial round protocols

  • [Goldreich-Micali-Wigderson87, Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]

Constant round protocols

  • [Beaver-Micali-Rogaway90]
  • And subsequently many works investigated improvements.

Two round protocols

  • [Ishai-Kushilevitz00, Ishai-Kushilevitz-Paskin10]: Unconditional security, ! < #/3 corruptions.
  • [Benhomouda-Lin17, Garg-Srinivasan17]: ! < # semi-honest corruptions based on OT. Malicious

corruptions in the CRS model.

slide-21
SLIDE 21

Brief History: Security with Abort

Polynomial round protocols

  • [Goldreich-Micali-Wigderson87, Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]

Constant round protocols

  • [Beaver-Micali-Rogaway90]
  • And subsequently many works investigated improvements.

Two round protocols

  • [Ishai-Kushilevitz00, Ishai-Kushilevitz-Paskin10]: Unconditional security, ! < #/3 corruptions.
  • [Benhomouda-Lin17, Garg-Srinivasan17]: ! < # semi-honest corruptions based on OT. Malicious

corruptions in the CRS model.

slide-22
SLIDE 22

Brief History: Security with Abort

Polynomial round protocols

  • [Goldreich-Micali-Wigderson87, Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]

Constant round protocols

  • [Beaver-Micali-Rogaway90]
  • And subsequently many works investigated improvements.

Two round protocols

  • [Ishai-Kushilevitz00, Ishai-Kushilevitz-Paskin10]: Unconditional security, ! < #/3 corruptions.
  • [Benhomouda-Lin17, Garg-Srinivasan17]: ! < # semi-honest corruptions based on OT. Malicious

corruptions in the CRS model.

slide-23
SLIDE 23

Brief History: Security with Abort

Polynomial round protocols

  • [Goldreich-Micali-Wigderson87, Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]

Constant round protocols

  • [Beaver-Micali-Rogaway90]
  • And subsequently many works investigated improvements.

Two round protocols

  • [Ishai-Kushilevitz00, Ishai-Kushilevitz-Paskin10]: Unconditional security, ! < #/3 corruptions.
  • [Benhomouda-Lin17, Garg-Srinivasan17]: ! < # semi-honest corruptions based on OT. Malicious

corruptions in the CRS model.

slide-24
SLIDE 24

Brief History: Security with Abort

Polynomial round protocols

  • [Goldreich-Micali-Wigderson87, Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]

Constant round protocols

  • [Beaver-Micali-Rogaway90]
  • And subsequently many works investigated improvements.

Two round protocols

  • [Ishai-Kushilevitz00, Ishai-Kushilevitz-Paskin10]: Unconditional security, ! < #/3 corruptions.
  • [Benhomouda-Lin17, Garg-Srinivasan17]: ! < # semi-honest corruptions based on OT. Malicious

corruptions in the CRS model.

slide-25
SLIDE 25

Question: Security with Abort

Does there exist a two round MPC protocol secure against ! < #/2 malicious corruptions in the plain model?

slide-26
SLIDE 26

Question: Security with Abort

Does there exist a two round MPC protocol secure against ! < #/2 malicious corruptions in the plain model?

Open regardless of assumptions. Impossible for dishonest majority [Garg- Mukherjee-Pandey- Polychroniadou16] Open even in semi-honest case from assumptions weaker than OT.

slide-27
SLIDE 27

Question: Security with Abort

Does there exist a two round MPC protocol secure against ! < #/2 malicious corruptions in the plain model?

Open regardless of assumptions. Impossible for dishonest majority [Garg- Mukherjee-Pandey- Polychroniadou16] Open even in semi-honest case from assumptions weaker than OT.

slide-28
SLIDE 28

Question: Security with Abort

Does there exist a two round MPC protocol secure against ! < #/2 malicious corruptions in the plain model?

Open regardless of assumptions. Impossible for dishonest majority [Garg- Mukherjee-Pandey- Polychroniadou16] Open even in semi-honest case from assumptions weaker than OT.

slide-29
SLIDE 29

Brief History: Guaranteed Output Delivery

slide-30
SLIDE 30

Brief History: Guaranteed Output Delivery

Upper Bounds

  • [Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]: Feasibility
  • [Ishai-Kushilevitz-Paskin10, Ishai-Kumaresan-Kushilevitz-Paskin15]: Two-round MPC in the

plain model with n>4, t=1 malicious corruptions from OWFs.

  • [Ishai-Kumaresan-Kushilevitz-Paskin15]: Two-round MPC in the plain model with n=4, t=1

malicious corruptions from injective OWFs.

  • [Gordon-Liu-Shi15]: Three-round maliciously secure protocol in the CRS model from LWE and

NIZKs.

Lower Bounds

  • [Gennaro-Ishai-Kushilevitz-Rabin’02]: Impossibility of two-round protocols with t>2 malicious

corruptions in the plain model.

  • [Gordon-Liu-Shi’15]: Impossibility of two-round broadcast channel protocols against fail-stop

corruptions.

slide-31
SLIDE 31

Brief History: Guaranteed Output Delivery

Upper Bounds

  • [Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]: Feasibility
  • [Ishai-Kushilevitz-Paskin10]: Two-round MPC in the plain model with n>4, t=1 malicious

corruptions from OWFs.

  • [Ishai-Kumaresan-Kushilevitz-Paskin15]: Two-round MPC in the plain model with n=4, t=1

malicious corruptions from injective OWFs.

  • [Gordon-Liu-Shi15]: Three-round maliciously secure protocol in the CRS model from LWE and

NIZKs.

Lower Bounds

  • [Gennaro-Ishai-Kushilevitz-Rabin’02]: Impossibility of two-round protocols with t>2 malicious

corruptions in the plain model.

  • [Gordon-Liu-Shi’15]: Impossibility of two-round broadcast channel protocols against fail-stop

corruptions.

slide-32
SLIDE 32

Brief History: Guaranteed Output Delivery

Upper Bounds

  • [Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]: Feasibility
  • [Ishai-Kushilevitz-Paskin10]: Two-round MPC in the plain model with n>4, t=1 malicious

corruptions from OWFs.

  • [Ishai-Kumaresan-Kushilevitz-Paskin15]: Two-round MPC in the plain model with n=4, t=1

malicious corruptions from injective OWFs.

  • [Gordon-Liu-Shi15]: Three-round maliciously secure protocol in the CRS model from LWE and

NIZKs.

Lower Bounds

  • [Gennaro-Ishai-Kushilevitz-Rabin’02]: Impossibility of two-round protocols with t>2 malicious

corruptions in the plain model.

  • [Gordon-Liu-Shi’15]: Impossibility of two-round broadcast channel protocols against fail-stop

corruptions.

slide-33
SLIDE 33

Brief History: Guaranteed Output Delivery

Upper Bounds

  • [Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]: Feasibility
  • [Ishai-Kushilevitz-Paskin10]: Two-round MPC in the plain model with n>4, t=1 malicious

corruptions from OWFs.

  • [Ishai-Kumaresan-Kushilevitz-Paskin15]: Two-round MPC in the plain model with n=4, t=1

malicious corruptions from injective OWFs.

  • [Gordon-Liu-Shi15]: Three-round maliciously secure protocol in the CRS model from LWE and

NIZKs.

Lower Bounds

  • [Gennaro-Ishai-Kushilevitz-Rabin’02]: Impossibility of two-round protocols with t>2 malicious

corruptions in the plain model.

  • [Gordon-Liu-Shi’15]: Impossibility of two-round broadcast channel protocols against fail-stop

corruptions.

slide-34
SLIDE 34

Brief History: Guaranteed Output Delivery

Upper Bounds

  • [Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]: Feasibility
  • [Ishai-Kushilevitz-Paskin10]: Two-round MPC in the plain model with n>4, t=1 malicious

corruptions from OWFs.

  • [Ishai-Kumaresan-Kushilevitz-Paskin15]: Two-round MPC in the plain model with n=4, t=1

malicious corruptions from injective OWFs.

  • [Gordon-Liu-Shi15]: Three-round maliciously secure protocol in the CRS model from LWE and

NIZKs.

Lower Bounds

  • [Gennaro-Ishai-Kushilevitz-Rabin’02]: Impossibility of two-round protocols with t>2 malicious

corruptions in the plain model.

  • [Gordon-Liu-Shi’15]: Impossibility of two-round broadcast channel protocols against fail-stop

corruptions.

slide-35
SLIDE 35

Brief History: Guaranteed Output Delivery

Upper Bounds

  • [Ben-Or-Goldwasser-Wigderson88, Chaum-Crépeau-Damgård88]: Feasibility
  • [Ishai-Kushilevitz-Paskin10]: Two-round MPC in the plain model with n>4, t=1 malicious

corruptions from OWFs.

  • [Ishai-Kumaresan-Kushilevitz-Paskin15]: Two-round MPC in the plain model with n=4, t=1

malicious corruptions from injective OWFs.

  • [Gordon-Liu-Shi15]: Three-round maliciously secure protocol in the CRS model from LWE and

NIZKs.

Lower Bounds

  • [Gennaro-Ishai-Kushilevitz-Rabin’02]: Impossibility of two-round protocols with t>2 malicious

corruptions in the plain model.

  • [Gordon-Liu-Shi’15]: Impossibility of two-round broadcast channel protocols against fail-stop

corruptions.

slide-36
SLIDE 36

Question: Guaranteed Output Delivery

slide-37
SLIDE 37

Question: Guaranteed Output Delivery

Does there exist a two round MPC protocol secure against ! < #/2 fail-stop corruptions in the plain model?

slide-38
SLIDE 38

Question: Guaranteed Output Delivery

Does there exist a two round MPC protocol secure against ! < #/2 fail-stop corruptions in the plain model? Does there exist a three round MPC protocol secure against ! < #/2 malicious corruptions in the plain model?

slide-39
SLIDE 39

Question: Guaranteed Output Delivery

Does there exist a two round MPC protocol secure against ! < #/2 fail-stop corruptions in the plain model? Does there exist a three round MPC protocol secure against ! < #/2 malicious corruptions in the plain model? Both questions open regardless of assumptions.

slide-40
SLIDE 40

Our Results: Security with Abort

Two round MPC for general functionalities in the plain model, assuming one-way functions.

slide-41
SLIDE 41

Our Results: Guaranteed Output Delivery

Broadcast channel protocol in the bare-public-key model, assuming PKE.

Fail-Stop Corruptions: Two round MPC for general functions:

Point-to-point channel protocol in the plain model, assuming OT.

slide-42
SLIDE 42

Our Results: Guaranteed Output Delivery

Broadcast channel protocol in the bare-public-key model, assuming PKE.

Fail-Stop Corruptions:

Point-to-point channel protocol in the plain model, assuming OT. Three round MPC from one-way functions in the plain model.

slide-43
SLIDE 43

Our Results: Guaranteed Output Delivery

Malicious Corruptions: Three round MPC for general functions:

Broadcast channel protocol in the plain model, assuming Zaps and PKE. Broadcast channel protocol in the bare-public-key model, assuming PKE.

Fail-Stop Corruptions: Two round MPC for general functions:

Point-to-point channel protocol in the plain model, assuming OT.

slide-44
SLIDE 44

Security with Abort against Malicious Adversaries

slide-45
SLIDE 45

[Garg-Srinivasan17]

A compiler from any polynomial round MPC protocol to a two round protocol using two round UC secure OT.

slide-46
SLIDE 46

[Garg-Srinivasan17]

A compiler from any polynomial round MPC protocol to a two round protocol using two round UC secure OT.

Starting Idea: Leverage honest majority to remove OT.

slide-47
SLIDE 47

[Garg-Srinivasan17]

Use of OT in [GS17]

slide-48
SLIDE 48

[Garg-Srinivasan17]

Any polynomial round MPC Protocol

Use of OT in [GS17] Start with any dishonest majority protocol based on OT over broadcast channels

slide-49
SLIDE 49

[Garg-Srinivasan17]

OT+GC

Two-round MPC Protocol Any polynomial round MPC Protocol

Use of OT in [GS17] Start with any dishonest majority protocol based on OT over broadcast channels Compile it into a 2 round protocol using OT and Garbled circuits

slide-50
SLIDE 50

Our Strategy

Use of OT in [GS17] Our approach 1 Start with any dishonest majority protocol based on OT over broadcast channels 2 Compile it into a 2 round protocol using OT and Garbled circuits

slide-51
SLIDE 51

Our Strategy

Use of OT in [GS17] Our approach 1 Start with any dishonest majority protocol based on OT over broadcast channels Start with an unconditionally secure honest majority protocol 2 Compile it into a 2 round protocol using OT and Garbled circuits

slide-52
SLIDE 52

Our Strategy

Use of OT in [GS17] Our approach 1 Start with any dishonest majority protocol based on OT over broadcast channels Start with an unconditionally secure honest majority protocol 2 Compile it into a 2 round protocol using OT and Garbled circuits

Require private channels

slide-53
SLIDE 53

Our Strategy

Use of OT in [GS17] Our approach 1 Start with any dishonest majority protocol based on OT over broadcast channels Start with an unconditionally secure honest majority protocol 2 Compile it into a 2 round protocol using OT and Garbled circuits

Require private channels

Challenges How to compress protocols that use private channels?

slide-54
SLIDE 54

Our Strategy

Use of OT in [GS17] Our approach 1 Start with any dishonest majority protocol based on OT over broadcast channels Start with an unconditionally secure honest majority protocol 2 Compile it into a 2 round protocol using OT and Garbled circuits Leverage honest majority to replace OT

Require private channels

Challenges How to compress protocols that use private channels? How to achieve OT functionality without OT?

slide-55
SLIDE 55

Recap of [Garg-Srinivasan17]

A Multi-round MPC Protocol

slide-56
SLIDE 56

Recap of [Garg-Srinivasan17]

Preprocessing Phase Computation Phase Conforming Protocol A Multi-round MPC Protocol

Transform into a “conforming protocol” with a specific syntactic structure.

slide-57
SLIDE 57

Recap of [Garg-Srinivasan17]

Preprocessing Phase Computation Phase A Multi-round MPC Protocol

Computation Phase: Only a single bit is broadcasted by a single party (speaker) in each round. All other parties are listeners for that round.

Conforming Protocol

slide-58
SLIDE 58

Recap of [Garg-Srinivasan17]

Preprocessing Phase Computation Phase A Multi-round MPC Protocol Two-round MPC Protocol

OT+GC

Conforming Protocol

slide-59
SLIDE 59

Recap of [Garg-Srinivasan17]

Preprocessing Phase Computation Phase Conforming Protocol Round 1

Two-round UC secure OT + Garbled Circuits

OT1 Messages Preprocessing Phase

  • Each party sends OT receiver

messages for the rounds in which it speaks.

  • These messages commit to all its

actions in the computation phase of the conforming protocol.

slide-60
SLIDE 60

Recap of [Garg-Srinivasan17]

Preprocessing Phase Computation Phase Round 1 OT1 Messages Preprocessing Phase Round 2 Each party sends garbled circuits corresponding to each round in the computation phase.

Two-round UC secure OT + Garbled Circuits

Conforming Protocol

slide-61
SLIDE 61

Recap of [Garg-Srinivasan17]

Preprocessing Phase Computation Phase Round 1 OT1 Messages Preprocessing Phase Round 2 GCs output the OT sender messages. Goal of these OTs is to deliver wire labels of GC.

Two-round UC secure OT + Garbled Circuits

Conforming Protocol

slide-62
SLIDE 62

Our Strategy: Challenge 2

Use of OT in [GS17] Our approach 1 Start with any dishonest majority protocol based on OT over broadcast channels Start with an unconditionally secure honest majority protocol 2 Compile it into a 2 round protocol using OT and Garbled circuits Leverage honest majority to replace OT

Require private channels

Challenges How to compress protocols that use private channels? How to achieve OT functionality without OT?

slide-63
SLIDE 63

New Gadget for OT: Multi-party OT

Multi-party protocol.

slide-64
SLIDE 64

New Gadget for OT: Multi-party OT

Multi-party protocol. Only 2 parties have inputs, others have no input.

slide-65
SLIDE 65

New Gadget for OT: Multi-party OT

Multi-party protocol. Only 2 parties have inputs, others have no input. Every party receives the output.

slide-66
SLIDE 66

New Gadget for OT: Multi-party OT

Multi-party protocol. Only 2 parties have inputs, others have no input. Every party receives the output. OT functionality for sender inputs ("#, "%) and receiver input (') can be represented as a degree 2 polynomial in ().

"* = "# 1 + ' + "%(')

slide-67
SLIDE 67

New Gadget for OT: Multi-party OT

Multi-party protocol. Only 2 parties have inputs, others have no input. Every party receives the output. OT functionality for sender inputs ("#, "%) and receiver input (') can be represented as a degree 2 polynomial in ().

"* = "# 1 + ' + "%(')

Later: How to implement

slide-68
SLIDE 68

Our Strategy: Challenge 1

Use of OT in [GS17] Our approach 1 Start with any dishonest majority protocol based on OT over broadcast channels Start with an unconditionally secure honest majority protocol 2 Compile it into a 2 round protocol using OT and Garbled circuits Leverage honest majority to replace OT

Require private channels

Challenges How to compress protocols that use private channels? How to achieve OT functionality without OT?

slide-69
SLIDE 69

Compressing Private Channel Protocols

Perfectly Secure Honest Majority Protocol

Uses both broadcast and private channels.

slide-70
SLIDE 70

Compressing Private Channel Protocols

Setup Phase Perfectly Secure Honest Majority Protocol

slide-71
SLIDE 71

Compressing Private Channel Protocols

Exchange one-time pads to emulate private channels.

Setup Phase Perfectly Secure Honest Majority Protocol

slide-72
SLIDE 72

Compressing Private Channel Protocols

Only uses broadcast channels Exchange one-time pads to emulate private channels.

Setup Phase Perfectly Secure Honest Majority Protocol

slide-73
SLIDE 73

Compressing Private Channel Protocols

Preprocessing Phase Conforming Protocol

Transform to a conforming protocol with a setup phase

Setup Phase Perfectly Secure Honest Majority Protocol Setup Phase Computation Phase

slide-74
SLIDE 74

Compressing Private Channel Protocols

Two-round Protocol MOT+GC Preprocessing Phase Conforming Protocol Setup Phase Perfectly Secure Honest Majority Protocol Setup Phase Computation Phase Setup Phase

slide-75
SLIDE 75

Compressing Private Channel Protocols

Perfectly Secure Honest Majority Protocol Setup Phase Preprocessing Phase Computation Phase Output Phase Conforming Protocol Setup Phase Two-round MPC Protocol Output Phase Setup Phase

Can we parallelize the first round with the setup phase?

slide-76
SLIDE 76

Can we parallelize the first round with the setup phase?

!

Conforming Protocol with setup

Listener of round " Speaker of round "

Setup Phase Preprocessing Phase Setup Phase Computation Phase

slide-77
SLIDE 77

Can we parallelize the first round with the setup phase?

(computation phase) !"#$%&$'(' (*⨁,)

Conforming Protocol with setup

Listener of round ( Speaker of round ( Speaker of round (

Setup Phase Round (

,

Preprocessing Phase Setup Phase Computation Phase

slide-78
SLIDE 78

Can we parallelize the first round with the setup phase?

Setup Phase

2 Round Protocol with setup

Round 1

!"#$%&$'(' )*

+ ,-''$.-'

Listener of round ( Speaker of round ( Speaker of round (

Setup Phase

/

Setup Phase Round 1 Round 2

slide-79
SLIDE 79

Can we parallelize the first round with the setup phase?

Setup Phase

2 Round Protocol with setup

Round 1

!"#$%&$'(' )*

+ ,-''$.-'

Listener of round ( Speaker of round ( Speaker of round (

Setup Phase

)*

+ messages commit to all

actions in the first round.

/

slide-80
SLIDE 80

Can we parallelize the first round with the setup phase?

Setup Phase

2 Round Protocol with setup

Round 1

!"#$%&$'(' )*

+ ,-''$.-'

Listener of round ( Speaker of round ( Speaker of round (

Setup Phase

)*

+ messages depend on /

which is not known before setup.

/

slide-81
SLIDE 81

Can we parallelize the first round with the setup phase?

Setup Phase

2 Round Protocol with setup

Listener of round ! Speaker of round !

Setup Phase

"

slide-82
SLIDE 82

Can we parallelize the first round with the setup phase?

Setup Phase

2 Round Protocol with setup

Listener of round ! Speaker of round !

Setup Phase

"

  • Similar problem arises.
  • Transfers the problem to another round.
slide-83
SLIDE 83

Can we parallelize the first round with the setup phase?

Setup Phase

2 Round Protocol with setup

Listener of round ! Speaker of round !

Setup Phase

"

  • Similar problem arises.
  • Transfers the problem to another round.

This approach doesn’t seem to work!

slide-84
SLIDE 84

Multi-party Homomorphic OT

  • Multi-party protocol.
  • Only 3 parties have inputs, others have no input.
  • Every party receives the output.
slide-85
SLIDE 85

Multi-party Homomorphic OT

Multi-party Homomorphic OT

Sender Receiver (+,, +.) (1)

slide-86
SLIDE 86

Multi-party Homomorphic OT

Multi-party Homomorphic OT

Sender Receiver Designated Sender (12, 14) (6) (7)

slide-87
SLIDE 87

Multi-party Homomorphic OT

Multi-party Homomorphic OT

Sender Receiver Designated Sender (12, 14) (6)

1789

(:)

slide-88
SLIDE 88

Multi-party Homomorphic OT

  • The homomorphic OT functionality with sender inputs ("#, "%),

receiver input (() and designated sender input ()) can be represented as degree 2 polynomial in *+.

",-. = "# 1 + ( + ) + "%(( + ))

slide-89
SLIDE 89

Parallelizing using MHOT

2 Round Protocol with setup

!"#$%&$'(' )*

+ ,-''$.-'

Listener of round ( Speaker of round ( Speaker of round ( /

Round 1 Setup Phase

slide-90
SLIDE 90

Parallelizing using MHOT

!"#$%&$'(' )*

+ ,-''$.-'

Listener of round ( Speaker of round ( Speaker of round ( /

2 Round Protocol with setup

Listener of round ( !"#$%&$'(' )*

+ ,-''$.-

0'12. 1230( /

Round 1 Setup Phase

slide-91
SLIDE 91

Parallelizing using MHOT

!"#$%&$'(' )*

+ ,-''$.-'

Listener of round ( Speaker of round ( Speaker of round ( /

2 Round Protocol with setup parallelized

Listener of round ( !"#$%&$'(' )*

+ ,-''$.-

0'12. 1230( /

Round 1 Setup Phase The homomorphism property of the multi-party OT allows us to parallelize

slide-92
SLIDE 92

Instantiating Multi-party Homomorphic OT

  • [Ishai-Kushilevitz-Paskin10] give a construction for such a degree 2

polynomial computation protocol that satisfies statistical t-privacy with knowledge of outputs.

slide-93
SLIDE 93

Ideal World: Privacy with Knowledge of Outputs

!" !#

slide-94
SLIDE 94

!" !# $ = &(!", !#)

Ideal World: Privacy with Knowledge of Outputs

slide-95
SLIDE 95

!" !# $ = &(!", !#) $′

Ideal World: Privacy with Knowledge of Outputs

slide-96
SLIDE 96

!" !# $ = &(!", !#) $′ $′

Ideal World: Privacy with Knowledge of Outputs

slide-97
SLIDE 97

Instantiating Multi-party Homomorphic OT

  • [Ishai-Kushilevitz-Paskin10] give a construction for such a degree 2

polynomial computation protocol that satisfies statistical t-privacy with knowledge of outputs.

Privacy with knowledge of outputs: A weaker notion than security with abort that does not guarantee correctness of output of the honest parties.

slide-98
SLIDE 98

Instantiating Multi-party Homomorphic OT

  • [Ishai-Kushilevitz-Paskin10] give a construction for such a degree 2

polynomial computation protocol that satisfies statistical t-privacy with knowledge of outputs.

Privacy with knowledge of outputs: A weaker notion than security with abort that does not guarantee correctness of output of the honest parties. Challenge: How to ensure correctness of honest party outputs?

slide-99
SLIDE 99

… (#$, #&) ( = #* (′ (′ Honest Sender

Challenge: How to ensure correctness of honest party outputs?

slide-100
SLIDE 100

… (#$, #&) ( = #* (′ (′ Honest Sender

(′ does not depend on #&,*

Challenge: How to ensure correctness of honest party outputs?

slide-101
SLIDE 101
  • OT functionality transmits wire labels for GC.
  • Unless valid labels are transmitted, GC remains private.
  • Since MOT functionality is used to transmit wire labels for GC, unless

valid labels are transmitted, GC remains private. Challenge: How to ensure correctness of honest party outputs?

slide-102
SLIDE 102

https://eprint.iacr.org/2018/572

Thank You.

aarushig@cs.jhu.edu