### Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications

Donghang Lu, Albert Yu, Aniket Kate, and Hemanta Maji

##### Abstract

While the practicality of secure multi-party computation (MPC) has been extensively analyzed and improved over the past decade, we are hitting the limits of efficiency with the traditional approaches of representing the computed functionalities as generic arithmetic or Boolean circuits. This work follows the design principle of identifying and constructing fast and provably-secure MPC protocols to evaluate useful high-level algebraic abstractions; thus, improving the efficiency of all applications relying on them. We present Polymath, a constant-round secure computation protocol suite for the secure evaluation of (multi-variate) polynomials of scalars and matrices, functionalities essential to numerous data-processing applications. Using precise natural precomputation and high-degree of parallelism prevalent in the modern computing environments, Polymath can make latency of secure polynomial evaluations of scalars and matrices independent of polynomial degree and matrix dimensions. We implement our protocols over the HoneyBadgerMPC library and apply them to two prominent secure computation tasks: privacy-preserving evaluation of decision trees and privacy-preserving evaluation of Markov processes. For the decision tree evaluation problem, we demonstrate the feasibility of evaluating high-depth decision tree models in a general n-party setting. For the Markov process application, we demonstrate that Polymath can compute large powers of transition matrices with better online time and less communication.

Available format(s)
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
Secure multi-party computation.
Contact author(s)
lu562 @ purdue edu
History
Short URL
https://ia.cr/2021/978

CC BY

BibTeX

@misc{cryptoeprint:2021/978,
author = {Donghang Lu and Albert Yu and Aniket Kate and Hemanta Maji},
title = {Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications},
howpublished = {Cryptology ePrint Archive, Paper 2021/978},
year = {2021},
note = {\url{https://eprint.iacr.org/2021/978}},
url = {https://eprint.iacr.org/2021/978}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.