Paper 2023/516

3-Party Secure Computation for RAMs: Optimal and Concretely Efficient

Atsunori Ichikawa, NTT Social Informatics Laboratories
Ilan Komargodski, Hebrew University of Jerusalem, NTT Research
Koki Hamada, NTT Social Informatics Laboratories
Ryo Kikuchi, NTT Social Informatics Laboratories
Dai Ikarashi, NTT Social Informatics Laboratories
Abstract

A distributed oblivious RAM (DORAM) is a method for accessing a secret-shared memory while hiding the accessed locations. DORAMs are the key tool for secure multiparty computation (MPC) for RAM programs that avoids expensive RAM-to-circuit transformations. We present new and improved 3-party DORAM protocols. For a logical memory of size $N$ and for each logical operation, our DORAM requires $O(\log N)$ local CPU computation steps. This is known to be asymptotically optimal. Our DORAM satisfies passive security in the honest majority setting. Our technique results with concretely-efficient protocols and does not use expensive cryptography (such as re-randomizable or homomorphic encryption). Specifically, our DORAM is 25X faster than the known most efficient DORAM in the same setting. Lastly, we extend our technique to handle malicious attackers at the expense of using slightly larger blocks (i.e., $\omega(\log^2 N)$ vs. $\Omega(\log N)$). To the best of our knowledge, this is the first concretely-efficient maliciously secure DORAM. Technically, our construction relies on a novel concretely-efficient 3-party oblivious permutation protocol. We combine it with efficient non-oblivious hashing techniques (i.e., Cuckoo hashing) to get a distributed oblivious hash table. From this, we build a full-fledged DORAM using a distributed variant of the hierarchical approach of Goldreich and Ostrovsky (J. ACM '96). These ideas, and especially the permutation protocol, are of independent interest.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
Distributed ORAMMPC for RAMsoblivious distributed permutation
Contact author(s)
atsunori ichikawa @ ntt com
ilank @ cs huji ac il
koki hamada @ ntt com
ryo kikuchi @ ntt com
dai ikarashi @ ntt com
History
2023-04-10: approved
2023-04-10: received
See all versions
Short URL
https://ia.cr/2023/516
License
Creative Commons Attribution-NonCommercial-NoDerivs
CC BY-NC-ND

BibTeX

@misc{cryptoeprint:2023/516,
      author = {Atsunori Ichikawa and Ilan Komargodski and Koki Hamada and Ryo Kikuchi and Dai Ikarashi},
      title = {3-Party Secure Computation for RAMs: Optimal and Concretely Efficient},
      howpublished = {Cryptology ePrint Archive, Paper 2023/516},
      year = {2023},
      note = {\url{https://eprint.iacr.org/2023/516}},
      url = {https://eprint.iacr.org/2023/516}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.