Paper 2024/383

Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers

Anasuya Acharya, Bar-Ilan University
Carmit Hazay, Bar-Ilan University
Vladimir Kolesnikov, Georgia Institute of Technology
Manoj Prabhakaran, Indian Institute of Technology Bombay
Abstract

SCALES (Small Clients And Larger Ephemeral Servers) model is a recently proposed model for MPC (Acharya et al., TCC 2022). While the SCALES model offers several attractive features for practical large-scale MPC, the result of Acharya et al. only offered semi-honest secure protocols in this model. We present a new efficient SCALES protocol secure against malicious adversaries, for general Boolean circuits. We start with the base construction of Acharya et al. and design and use a suite of carefully defined building blocks that may be of independent interest. The resulting protocol is UC-secure without honest majority, with a CRS and bulletin-board as setups, and allows publicly identifying deviations from correct execution.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in CRYPTO 2024
Keywords
SCALESMPC with Ephemeral ServersMalicious SecurityDishonest MajorityRerandomizable Garbled Circuits
Contact author(s)
acharya @ biu ac il
carmit hazay @ biu ac il
kolesnikov @ gatech edu
mp @ cse iitb ac in
History
2024-05-30: revised
2024-03-01: received
See all versions
Short URL
https://ia.cr/2024/383
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/383,
      author = {Anasuya Acharya and Carmit Hazay and Vladimir Kolesnikov and Manoj Prabhakaran},
      title = {Malicious Security for {SCALES}: Outsourced Computation with Ephemeral Servers},
      howpublished = {Cryptology ePrint Archive, Paper 2024/383},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/383}},
      url = {https://eprint.iacr.org/2024/383}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.