Optimizing Semi-Honest Secure Multiparty Computation for the Internet

Aner Ben-Efraim, Yehuda Lindell, and Eran Omri

Abstract

In the setting of secure multiparty computation, a set of parties with private inputs wish to compute some function of their inputs without revealing anything but their output. Over the last decade, the efficiency of secure \emph{two-party} computation has advanced in leaps and bounds, with speedups of some orders of magnitude, making it fast enough to be of use in practice. In contrast, progress on the case of multiparty computation (with more than two parties) has been much slower, with very little work being done. Currently, the only implemented efficient multiparty protocol has many rounds of communication (linear in the depth of the circuit being computed) and thus is not suited for Internet-like settings where latency is not very low. In this paper, we construct highly efficient \emph{constant-round} protocols for the setting of multiparty computation for semi-honest adversaries. Our protocols work by constructing a multiparty garbled circuit, as proposed in BMR (Beaver et al., STOC 1990). Our first protocol uses oblivious transfer and constitutes the \textit{first} concretely-efficient constant-round multiparty protocol for the case of no honest majority. Our second protocol uses BGW, and is significantly more efficient than the FairplayMP protocol (Ben-David et al., CCS 2008) that also uses BGW. We ran extensive experimentation comparing our different protocols with each other and with a highly-optimized implementation of semi-honest GMW. Due to our protocol being constant round, it significantly outperforms GMW in Internet-like settings. For example, with 13 parties situated in the Virginia and Ireland Amazon regions and the SHA256 circuit with 90,000 gates and of depth 4000, the overall running time of our protocol is 25 seconds compared to 335 seconds for GMW. Furthermore, our \emph{online time} is under half a second compared to 330 seconds for GMW.

Metadata
Available format(s)
Category
Cryptographic protocols
Publication info
Published elsewhere. MINOR revision.ACM CCS 2016
DOI
10.1145/2976749.2978347
Keywords
secure multiparty computationsemi-honest adversariesconstant-round protocolsconcrete efficiency
Contact author(s)
lindell @ biu ac il
History
2016-11-15: received
Short URL
https://ia.cr/2016/1066
License

CC BY

BibTeX

@misc{cryptoeprint:2016/1066,
author = {Aner Ben-Efraim and Yehuda Lindell and Eran Omri},
title = {Optimizing Semi-Honest Secure Multiparty Computation for the Internet},
howpublished = {Cryptology ePrint Archive, Paper 2016/1066},
year = {2016},
doi = {10.1145/2976749.2978347},
note = {\url{https://eprint.iacr.org/2016/1066}},
url = {https://eprint.iacr.org/2016/1066}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.