### Use your Brain! Arithmetic 3PC For Any Modulus with Active Security

Hendrik Eerikson, Marcel Keller, Claudio Orlandi, Pille Pullonen, Joonas Puura, and Mark Simkin

##### Abstract

Secure multiparty computation (MPC) allows a set of mutually distrustful parties to compute a public function on their private inputs without revealing anything beyond the output of the computation. This paper focuses on the specific case of actively secure three-party computation with an honest majority. In particular, we are interested in solutions which allow to evaluate arithmetic circuits over real-world CPU word sizes, like 32- and 64-bit words. Our starting point is the novel compiler of Damgård et al. from CRYPTO 2018. First, we present an improved version of it which reduces the online communication complexity by a factor of 2. Next, we replace their preprocessing protocol (with arithmetic modulo a large prime) with a more efficient preprocessing which only performs arithmetic modulo powers of two. Finally, we present a novel "postprocessing" check which replaces the preprocessing phase. These protocols offer different efficiency tradeoffs and can therefore outperform each other in different deployment settings. We demonstrate this with benchmarks in a LAN and different WAN settings. Concretely, we achieve a throughput of 1 million 64-bit multiplications per second with parties located in different continents and 3 million in one location.

Note: Published version

Available format(s)
Category
Implementation
Publication info
Published elsewhere. ITC 2020
DOI
10.4230/LIPIcs.ITC.2020.5
Keywords
Secure Multiparty ComputationInformation Theoretic Security
Contact author(s)
simkin @ cs au dk
orlandi @ cs au dk
mks keller @ gmail com
History
2021-11-02: last of 2 revisions
See all versions
Short URL
https://ia.cr/2019/164

CC BY

BibTeX

@misc{cryptoeprint:2019/164,
author = {Hendrik Eerikson and Marcel Keller and Claudio Orlandi and Pille Pullonen and Joonas Puura and Mark Simkin},
title = {Use your Brain! Arithmetic 3PC For Any Modulus with Active Security},
howpublished = {Cryptology ePrint Archive, Paper 2019/164},
year = {2019},
doi = {10.4230/LIPIcs.ITC.2020.5},
note = {\url{https://eprint.iacr.org/2019/164}},
url = {https://eprint.iacr.org/2019/164}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.