Paper 2014/936

Outsourcing Secure Two-Party Computation as a Black Box

Henry Carter, Benjamin Mood, Patrick Traynor, and Kevin Butler


Secure multiparty computation (SMC) offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic construction feasible on mobile devices securely outsource the bulk of the computation to a cloud provider. However, these outsourcing techniques are built on specific secure computation assumptions and tools, and applying new SMC ideas to the outsourced setting requires the protocols to be completely rebuilt and proven secure. In this work, we develop a generic technique for lifting any secure two-party computation protocol into an outsourced two-party SMC protocol. By augmenting the function being evaluated with auxiliary consistency checks and input values, we can create an outsourced protocol with low overhead cost. Our implementation and evaluation show that in the best case, our outsourcing additions execute within the confidence intervals of two servers running the same computation, and consume approximately the same bandwidth. In addition, the mobile device itself uses minimal bandwidth over a single round of communication. This work demonstrates that efficient outsourcing is possible with any underlying SMC scheme, and provides an outsourcing protocol that is efficient and directly applicable to current and future SMC techniques.

Available format(s)
Cryptographic protocols
Publication info
Published elsewhere. Major revision. Proceedings of the International Conference on Cryptology and Network Security (CANS), 2015
server-aided cryptographymulti-party computationgarbled circuits
Contact author(s)
carterh @ gatech edu
2015-10-07: revised
2014-11-18: received
See all versions
Short URL
Creative Commons Attribution


      author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler},
      title = {Outsourcing Secure Two-Party Computation as a Black Box},
      howpublished = {Cryptology ePrint Archive, Paper 2014/936},
      year = {2014},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.