Paper 2019/454

Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks

Ryan Karl, Timothy Burchfield, Jonathan Takeshita, and Taeho Jung

Abstract

Secure multiparty computation (MPC) has been repeatedly optimized, and protocols with two communication rounds and strong security guarantees have been achieved. While progress has been made constructing non-interactive protocols with just one-round of online communication (i.e., non-interactive MPC or NI-MPC), since correct evaluation must be guaranteed with only one round, these protocols are by their nature vulnerable to the residual function attack in the standard model. This is because a party that receives a garbled circuit may repeatedly evaluate the circuit locally, while varying their own inputs and fixing the input of others to learn the values entered by other participants. We present the first MPC protocol with a one-round online phase that is secure against the residual function attack. We also present rigorous proofs of correctness and security in the covert adversary model, a reduction of the malicious model that is stronger than the semi-honest model and better suited for modeling the behaviour of parties in the real world, for our protocol. Furthermore, we rigorously analyze the communication and computational complexity of current state of the art protocols which require two rounds of communication or one-round during the online-phase with a reduced security requirement, and demonstrate that our protocol is comparable to or outperforms their complexity.

Note: Added the DOI.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision.15th EAI International Conference on Security and Privacy in Communication Networks
DOI
10.1007/978-3-030-37231-6_25
Keywords
Non-Interactive MPCCommunication round complexityTrusted hardware
Contact author(s)
tjung @ nd edu
History
2020-01-16: last of 2 revisions
2019-05-08: received
See all versions
Short URL
https://ia.cr/2019/454
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/454,
      author = {Ryan Karl and Timothy Burchfield and Jonathan Takeshita and Taeho Jung},
      title = {Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks},
      howpublished = {Cryptology ePrint Archive, Paper 2019/454},
      year = {2019},
      doi = {10.1007/978-3-030-37231-6_25},
      note = {\url{https://eprint.iacr.org/2019/454}},
      url = {https://eprint.iacr.org/2019/454}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.