Paper 2025/773
Exploring Adversarial Attacks on the MaSTer Truncation Protocol
Abstract
At CANS 2024, Zbudila et al. presented MaSTer, a maliciously secure multi-party computation protocol for truncation. It allows adversaries to manipulate outputs with a bounded additive error while avoiding detection with a certain probability. In this work, we analyse the broader implications of adversarial exploitation in probabilistic truncation protocols, specifically in relation to MaSTer. We propose three attack strategies aimed at inducing misclassification in deep neural network (DNN) inference. Our empirical evaluation across multiple datasets demonstrates that while adversarial influence remains negligible under realistic constraints, certain configurations and network architectures exhibit increased vulnerability. By improving the understanding of the risks associated with probabilistic truncation protocols in privacy-preserving machine learning, our work demonstrates that the MaSTer protocol is robust in realistic settings.
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Published elsewhere. Major revision. IH&MMSEC'25
- DOI
- 10.1145/3733102.3733119
- Keywords
- Multi Party ComputationMachine LearningAttackTruncation
- Contact author(s)
-
martin zbudila @ esat kuleuven be
aysajan abidin @ esat kuleuven be
bart preneel @ esat kuleuven be - History
- 2025-04-30: approved
- 2025-04-30: received
- See all versions
- Short URL
- https://ia.cr/2025/773
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2025/773, author = {Martin Zbudila and Aysajan Abidin and Bart Preneel}, title = {Exploring Adversarial Attacks on the {MaSTer} Truncation Protocol}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/773}, year = {2025}, doi = {10.1145/3733102.3733119}, url = {https://eprint.iacr.org/2025/773} }