Tw Two-round Secu cure MPC from Mi Mini nimal Assum umptions - - PowerPoint PPT Presentation

β–Ά
tw two round secu cure mpc from mi mini nimal assum
SMART_READER_LITE
LIVE PREVIEW

Tw Two-round Secu cure MPC from Mi Mini nimal Assum umptions - - PowerPoint PPT Presentation

Tw Two-round Secu cure MPC from Mi Mini nimal Assum umptions ns Sanjam Garg Akshayaram Srinivasan University of California, Berkeley Eurocrypt 2018 Secure Two-Party Computation [Yao 86] Securely compute ( " , #


slide-1
SLIDE 1

Tw Two-round Secu cure MPC from Mi Mini nimal Assum umptions ns

Sanjam Garg Akshayaram Srinivasan University of California, Berkeley Eurocrypt 2018

slide-2
SLIDE 2

Secure Two-Party Computation

[Yao 86]

𝑦" 𝑦# β€œSecurely” compute 𝑔(𝑦", 𝑦#)

  • Two-rounds are necessary.
  • Garbled circuits + two-round OT => two-round secure 2-PC
  • Minimal assumptions
slide-3
SLIDE 3

Secure Multiparty Computation

[Goldreich-Micali-Wigderson 87]

𝑦" 𝑦# 𝑦( 𝑦) 𝑦* 𝑦+ 𝑦,

…

Compute 𝑔(𝑦", 𝑦#, … , 𝑦,)

slide-4
SLIDE 4

𝑦)

…

Not learn anything about honest parties inputs apart from 𝑔(𝑦", 𝑦#, … , 𝑦,)

Secure Multiparty Computation

[Yao 86, Goldreich-Micali-Wigderson 87]

𝑦" 𝑦# 𝑦( 𝑦* 𝑦+ 𝑦,

slide-5
SLIDE 5

What is known?

  • Goldreich-Micali-Wigderson protocol.
  • Number of rounds grows with the depth of the circuit.
  • Long line of work reducing the round complexity [BMR90,…].
  • Two-round secure MPC protocols [GGHR14, GLS15, MW16,

BGI17,GS17].

  • Gap in the assumptions sufficient for two-round MPC and 2PC.

Can we construct two-round MPC from weaker assumptions?

slide-6
SLIDE 6

Our Work

Two-round protocol for secure multiparty computation from any two- round oblivious transfer.

  • Semi-honest: From any two-round OT in the plain model.
  • Malicious: From any two-round maliciously secure OT in the CRS

model. Concurrent and Independent work by Benhamouda-Lin 18

slide-7
SLIDE 7

Ma Main Idea

slide-8
SLIDE 8

𝑦" 𝑦# 𝑦( 𝑦) 𝑦* 𝑦+ 𝑦,

…

Protocol 𝜚 securely computes 𝑔(𝑦", 𝑦#, … , 𝑦,)

Round Compression

slide-9
SLIDE 9

Round Compression

𝑦" 𝑦# 𝑦( 𝑦) 𝑦* 𝑦+ 𝑦,

…

Two broadcast rounds

slide-10
SLIDE 10

Toy protocol 𝜚

Round-1 𝑏 Round-2 Round-3

𝑔 𝑏, 𝑐, 𝑑 = (𝑏, 𝑏 ∧ 𝑐, 𝑏 ∧ 𝑐 ∧ 𝑑)

Inputs: 𝑏 𝑐 𝑑 𝑏 ∧ 𝑐 𝑏 ∧ 𝑐 ∧ 𝑑

slide-11
SLIDE 11

Ro Round Compression using Garbled Circuits

slide-12
SLIDE 12

Garbled Circuits

[Yao 86, Applebaum-Ishai-Kushilevitz 04, Bellare-Hoang-Rogaway 12]

𝑔: 0,1 , β†’ 0,1 9

𝑔 𝑔 :

π‘š<

" π‘š" "

π‘š<

# π‘š" #

π‘š<

, π‘š" ,

slide-13
SLIDE 13

Garbled Circuits

[Yao 86, Applebaum-Ishai-Kushilevitz 04, Bellare-Hoang-Rogaway 12]

𝑔 :

π‘š=>

"

π‘š=?

#

π‘š=@

,

+

Evaluation

𝑔(𝑦)

slide-14
SLIDE 14

𝑔 :

π‘š=>

"

π‘š=?

#

π‘š=@

,

+

Leaks only

Garbled Circuits

[Yao 86, Applebaum-Ishai-Kushilevitz 04, Bellare-Hoang-Rogaway 12]

𝑔(𝑦)

slide-15
SLIDE 15

Ho How w to Compr pres ess the the Toy Protocol l to 2 ro rounds?

slide-16
SLIDE 16

Two-Round Protocol: High level Idea

Inputs: 𝑏 𝑐 𝑑 Round-1 𝑏 Round-2

Implement the 2nd round Implements the 3rd round

slide-17
SLIDE 17

How do the garbled circuits implement rounds?

𝑏, 𝑐 𝑑

Round-2 Round-3

𝑏 ∧ 𝑐 𝑑, 𝑏 ∧ 𝑐 𝑏 ∧ 𝑐 ∧ 𝑑

In [GS17], we achieved this by a special purpose WE [GGSW13, DG17]

slide-18
SLIDE 18

Ma Maki king t the g garb rbled c circuits β€œt β€œtalk” f k” from O OT

slide-19
SLIDE 19

Oblivious Transfer

[Rabin 81]

𝑐 𝑛<, 𝑛"

π’‘π’–π’•πŸ ← π‘·π‘ΌπŸ(𝒄; 𝒔)

Two-message OTs are known from a variety of assumptions [AIR01,NP01,PVW08]

π’‘π’–π’•πŸ‘ ← π‘·π‘ΌπŸ‘(π’‘π’–π’•πŸ, π’πŸ, π’πŸ) 𝒏𝒄 ← π‘·π‘ΌπŸ’(π’‘π’–π’•πŸ‘, 𝒔)

slide-20
SLIDE 20

Two-Round Protocol for Toy Function

Inputs: 𝑏 𝑐 𝑑

π‘ƒπ‘ˆ

" 0 ∧ 𝑐; πœ•<

1 π‘ƒπ‘ˆ

" 1 ∧ 𝑐; πœ•"

Round-1 𝑏 Round-2

slide-21
SLIDE 21

Functions computed by Garbled Circuits

𝑏, 𝑐

πœ•<, πœ•"

𝑑

π‘šT

"

π‘ƒπ‘ˆ#(π‘ƒπ‘ˆ

"(𝑏 ∧ 𝑐), π‘š< #, π‘š" #)

πœ•U π‘š<

#, π‘š" #

π‘ƒπ‘ˆ

" 0 ∧ 𝑐; πœ•<

1 π‘ƒπ‘ˆ

" 1 ∧ 𝑐; πœ•"

π‘š<

", π‘š" "

𝑑, 𝑏 ∧ 𝑐 𝑏 ∧ 𝑐 ∧ 𝑑

𝑏 𝑏 ∧ 𝑐

Party 2 Party 3

slide-22
SLIDE 22

Ge Generalizing t to Arb Arbitrary C y Computations

slide-23
SLIDE 23

General Case

Round-1 Round-2 . . . Round-T 𝐷" 𝐷# 𝐷W

slide-24
SLIDE 24

Conclusion

  • We gave a two-round protocol for secure multiparty computation

from two-round OT.

  • In a subsequent work [Garg-Miao-S], we gave a protocol where the

number of public key operations is independent of the circuit size.

  • Open Questions:
  • Can we improve the communication complexity?
  • Concrete efficiency?

Th Than ank you

  • u!