Paper 2019/207
MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security
Dragos Rotaru and Tim Wood
Abstract
Most modern actively-secure multiparty computation (MPC) protocols involve generating random data that is secret-shared and
authenticated, and using it to evaluate arithmetic or Boolean circuits in different ways. In this work we present a generic method for converting authenticated secret-shared data between different fields, and show how to use it to evaluate so-called ``mixed'' circuits with active security and in the full-threshold setting. A mixed circuit is one in which parties switch between different subprotocols dynamically as computation proceeds, the idea being that some protocols are more efficient for evaluating arithmetic circuits, and others for Boolean circuits.
One use case of our switching mechanism is for converting between secret-sharing-based MPC and garbled circuits (GCs). The former is more suited to the evaluation of arithmetic circuits and can easily be used to emulate arithmetic over the integers, whereas the latter is better for Boolean circuits and has constant round complexity. Much work already exists in the two-party semi-honest setting, but the
Note: Added full version
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. INDOCRYPT 2019
- Keywords
- MPCGarbled CircuitsSecret SharingDishonest Majority
- Contact author(s)
-
dragos rotaru @ esat kuleuven be
t wood @ kuleuven be - History
- 2019-10-16: revised
- 2019-02-27: received
- See all versions
- Short URL
- https://ia.cr/2019/207
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/207, author = {Dragos Rotaru and Tim Wood}, title = {{MArBled} Circuits: Mixing Arithmetic and Boolean Circuits with Active Security}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/207}, year = {2019}, url = {https://eprint.iacr.org/2019/207} }