Paper 2019/454
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Ryan Karl, Timothy Burchfield, Jonathan Takeshita, and Taeho Jung
Abstract
Secure multiparty computation (MPC) has been repeatedly optimized, and protocols with two communication rounds and strong security guarantees have been achieved. While progress has been made constructing non-interactive protocols with just one-round of online communication (i.e., non-interactive MPC or NI-MPC), since correct evaluation must be guaranteed with only one round, these protocols are by their nature vulnerable to the residual function attack in the standard model. This is because a party that receives a garbled circuit may repeatedly evaluate the circuit locally, while varying their own inputs and fixing the input of others to learn the values entered by other participants. We present the first MPC protocol with a one-round online phase that is secure against the residual function attack. We also present rigorous proofs of correctness and security in the covert adversary model, a reduction of the malicious model that is stronger than the semi-honest model and better suited for modeling the behaviour of parties in the real world, for our protocol. Furthermore, we rigorously analyze the communication and computational complexity of current state of the art protocols which require two rounds of communication or one-round during the online-phase with a reduced security requirement, and demonstrate that our protocol is comparable to or outperforms their complexity.
Note: Added the DOI.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Minor revision. 15th EAI International Conference on Security and Privacy in Communication Networks
- DOI
- 10.1007/978-3-030-37231-6_25
- Keywords
- Non-Interactive MPCCommunication round complexityTrusted hardware
- Contact author(s)
- tjung @ nd edu
- History
- 2020-01-16: last of 2 revisions
- 2019-05-08: received
- See all versions
- Short URL
- https://ia.cr/2019/454
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2019/454, author = {Ryan Karl and Timothy Burchfield and Jonathan Takeshita and Taeho Jung}, title = {Non-Interactive {MPC} with Trusted Hardware Secure Against Residual Function Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2019/454}, year = {2019}, doi = {10.1007/978-3-030-37231-6_25}, url = {https://eprint.iacr.org/2019/454} }