In this paper we present TASTY, a novel tool for automating, i.e., describing, generating, executing, benchmarking, and comparing, efficient secure two-party computation protocols. TASTY is a new compiler that can generate protocols based on homomorphic encryption and efficient garbled circuits as well as combinations of both, which often yields the most efficient protocols available today. The user provides a high-level description of the computations to be performed on encrypted data in a domain-specific language. This is automatically transformed into a protocol. TASTY provides most recent techniques and optimizations for practical secure two-party computation with low online latency. Moreover, it allows to efficiently evaluate circuits generated by the well-known Fairplay compiler.
We use TASTY to compare protocols for secure multiplication based on homomorphic encryption with those based on garbled circuits and highly efficient Karatsuba multiplication. Further, we show how TASTY improves the online latency for securely evaluating the AES functionality by an order of magnitude compared to previous software implementations. TASTY allows to automatically generate efficient secure protocols for many privacy-preserving applications where we consider the use cases for private set intersection and face recognition protocols.Category / Keywords: cryptographic protocols / Publication Info: Full version of ACM CCS 2010 paper. Date: received 22 Jun 2010, last revised 13 Dec 2010 Contact author: thomas schneider at trust rub de Available format(s): PDF | BibTeX Citation Note: - TASTY is available for download at http://tastyproject.net - slightly better performance for face recognition Version: 20101213:104733 (All versions of this report) Short URL: ia.cr/2010/365 Discussion forum: Show discussion | Start new discussion