## Cryptology ePrint Archive: Report 2019/836

Optimal Transport Layer for Secure Computation

Markus Brandt and Claudio Orlandi and Kris Shrishak and Haya Shulman

Abstract: We explore two main issues in the performance of Secure Two- Party Computation (2PC): (1) interaction of 2PC with the transport layer and (2) evaluation of 2PC implementations.

Transport layer: Although significantly improved, the performance of 2PC is still prohibitive for practical systems. Contrary to the common belief that bandwidth is the remaining bottleneck for 2PC implementation, we show that the network is under-utilised due to the use of standard TCP sockets. Nevertheless, using other sockets is a nontrivial task: the developers of secure computation need to integrate them into the operating systems, which is challenging even for systems experts. To resolve this issue, and break the efficiency barrier of 2PC, we design and develop a framework, we call Transputation, which automates the integration of transport layer sockets into 2PC implementations. The goal of Transputation is to enable developers of 2PC protocols to easily identify and use the optimal transport layer protocol for the given computation task and network conditions and hence to improve performance of secure computation.

We integrated selected transport layer protocols into Transputation and evaluated the performance for a number of computational tasks. As a highlight, even a general purpose transport layer protocol, such as SABUL, improves the run-time of 2PC over TCP on EU-Australia connection for circuits with $> 10^6$ Boolean gates by a factor of $8$.

Evaluations of 2PC: Evaluations of 2PC implementations do not reflect performance in real networks since they are typically done on simulated environments and even more often on a single host. To address this issue, we provide a testbed platform for evaluation of 2PC implementations in real life settings on the Internet.

Category / Keywords: Framework, Transport layer, Garbled circuits; Implementation

Original Publication (with minor differences): The 17th International Conference on Security and Cryptography (SECRYPT 2020)

Date: received 18 Jul 2019, last revised 30 Jun 2020

Contact author: kris shrishak at sit tu-darmstadt de

Available format(s): PDF | BibTeX Citation

Short URL: ia.cr/2019/836

[ Cryptology ePrint archive ]