Paper 2016/809

Binary AMD Circuits from Secure Multiparty Computation

Daniel Genkin, Yuval Ishai, and Mor Weiss

Abstract

An AMD circuit over a finite field $\mathbb F$ is a randomized arithmetic circuit that offers the ``best possible protection'' against additive attacks. That is, the effect of every additive attack that may blindly add a (possibly different) element of $\mathbb F$ to every internal wire of the circuit can be simulated by an ideal attack that applies only to the inputs and outputs. Genkin et al. (STOC 2014, Crypto 2015) introduced AMD circuits as a means for protecting MPC protocols against active attacks, and showed that every arithmetic circuit C over F can be transformed into an equivalent AMD circuit of size $O(|C|)$ with $O(1/|\mathbb F|)$ simulation error. However, for the case of the binary field $\mathbb F=\mathbb F_2$, their constructions relied on a tamper-proof output decoder and could only realize a weaker notion of security. We obtain the first constructions of fully secure binary AMD circuits. Given a boolean circuit $C$ and a statistical security parameter $s$, we construct an equivalent binary AMD circuit $C'$ of size $|C|*polylog(|C|,s)$ (ignoring lower order additive terms) with $2^{-s}$ simulation error. That is, the effect of toggling an arbitrary subset of wires can be simulated by toggling only input and output wires. Our construction combines in a general way two types of ``simple'' honest-majority MPC protocols: protocols that only offer security against passive adversaries, and protocols that only offer correctness against active adversaries. As a corollary, we get a conceptually new technique for constructing active-secure two-party protocols in the OT-hybrid model, and reduce the open question of obtaining such protocols with constant computational overhead to a similar question in these simpler MPC models.

Metadata
Available format(s)
PDF
Publication info
Published by the IACR in TCC 2016
Keywords
Algebraic Manipulation DetectionAMD CircuitsSecure Multiparty Computation
Contact author(s)
danielg3 @ cs technion ac il
yuvali @ cs technion ac il
morw @ cs technion ac il
History
2016-08-25: received
Short URL
https://ia.cr/2016/809
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/809,
      author = {Daniel Genkin and Yuval Ishai and Mor Weiss},
      title = {Binary {AMD} Circuits from Secure Multiparty Computation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/809},
      year = {2016},
      url = {https://eprint.iacr.org/2016/809}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.