Paper 2024/383

Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers

Anasuya Acharya, Bar-Ilan University
Carmit Hazay, Bar-Ilan University
Vladimir Kolesnikov, Georgia Institute of Technology
Manoj Prabhakaran, Indian Institute of Technology Bombay
Abstract

SCALES (Small Clients And Larger Ephemeral Servers) model is a recently proposed model for MPC (Acharya et al., TCC 2022). While the SCALES model offers several attractive features for practical large-scale MPC, the result of Acharya et al. only offered semi-honest secure protocols in this model. We present a new efficient SCALES protocol secure against malicious adversaries, for general Boolean circuits. We start with the base construction of Acharya et al. and design and use a suite of carefully defined building blocks that may be of independent interest. The resulting protocol is UC-secure without honest majority, with a CRS and bulletin-board as setups, and allows publicly identifying deviations from correct execution.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
SCALESMPC with Ephemeral ServersMalicious SecurityDishonest MajorityRerandomizable Garbled Circuits
Contact author(s)
acharya @ biu ac il
carmit hazay @ biu ac il
kolesnikov @ gatech edu
mp @ cse iitb ac in
History
2024-03-04: approved
2024-03-01: received
See all versions
Short URL
https://ia.cr/2024/383
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/383,
      author = {Anasuya Acharya and Carmit Hazay and Vladimir Kolesnikov and Manoj Prabhakaran},
      title = {Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers},
      howpublished = {Cryptology ePrint Archive, Paper 2024/383},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/383}},
      url = {https://eprint.iacr.org/2024/383}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.