Paper 2016/632

Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution

Peter Rindal and Mike Rosulek

Abstract

We describe a highly optimized protocol for general-purpose secure two-party computation (2PC) in the presence of malicious adversaries. Our starting point is a protocol of Kolesnikov \etal (TCC 2015). We adapt that protocol to the online/offline setting, where two parties repeatedly evaluate the same function (on possibly different inputs each time) and perform as much of the computation as possible in an offline preprocessing phase before their inputs are known. Along the way we develop several significant simplifications and optimizations to the protocol. We have implemented a prototype of our protocol and report on its performance. When two parties on Amazon servers in the same region use our implementation to securely evaluate the AES circuit 1024 times, the amortized cost per evaluation is \emph{5.1ms offline + 1.3ms online}. The total offline+online cost of our protocol is in fact less than the \emph{online} cost of any reported protocol with malicious security. For comparison, our protocol's closest competitor (Lindell \& Riva, CCS 2015) uses 74ms offline + 7ms online in an identical setup. Our protocol can be further tuned to trade performance for leakage. As an example, the performance in the above scenario improves to \emph{2.4ms offline + 1.0ms online} if we allow an adversary to learn a single bit about the honest party's input with probability $2^{-20}$ (but not violate any other security property, e.g. correctness).

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Major revision. USENIX 2016
Keywords
secure computationgarbled circuitsdual execution
Contact author(s)
rindalp @ oregonstate edu
History
2016-06-21: received
Short URL
https://ia.cr/2016/632
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/632,
      author = {Peter Rindal and Mike Rosulek},
      title = {Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution},
      howpublished = {Cryptology ePrint Archive, Paper 2016/632},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/632}},
      url = {https://eprint.iacr.org/2016/632}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.