Paper 2020/1259
Silent Two-party Computation Assisted by Semi-trusted Hardware
Yibiao Lu and Bingsheng Zhang and Weiran Liu and Lei Zhang and Kui Ren
Abstract
With the advancement of the trusted execution environment (TEE) technologies, hardware-supported secure computing becomes increasingly popular due to its efficiency. During the protocol execution, typically, the players need to contact a third-party server for remote attestation, ensuring the validity of the involved trusted hardware component, such as Intel SGX, as well as the integrity of the computation result. When the hardware manufacturer is not fully trusted, sensitive information may be leaked to the third-party server through backdoors, side-channels, steganography, and kleptography, etc. In this work, we introduce a new security notion called semi-trusted hardware model, where the adversary is allowed to passively and/or maliciously corrupt the hardware component. Therefore, she can learn the input of the hardware component and might also tamper the output. We show that two-party computation can still be significantly sped up in this new model. When the semi-trusted hardware is instantiated by Intel SGX, to generate 10k random OT's, our protocol is 50X and 270X faster than the EMP-ROT in the LAN and WAN setting, respectively. For the AES, SHA-1, and SHA-256 evaluation, our protocol is 4-5X and 40-50X faster than the EMP-SH2PC in the LAN and WAN setting, respectively.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint. MINOR revision.
- Keywords
- 2PCsemi-trusted hardware modelgarbled circuit
- Contact author(s)
- luyibiao @ zju edu cn,bingsheng @ zju edu cn
- History
- 2021-10-04: last of 7 revisions
- 2020-10-14: received
- See all versions
- Short URL
- https://ia.cr/2020/1259
- License
-
CC BY