Paper 2025/773

Exploring Adversarial Attacks on the MaSTer Truncation Protocol

Martin Zbudila, COSIC, KU Leuven
Aysajan Abidin, COSIC, KU Leuven
Bart Preneel, COSIC, KU Leuven
Abstract

At CANS 2024, Zbudila et al. presented MaSTer, a maliciously secure multi-party computation protocol for truncation. It allows adversaries to manipulate outputs with a bounded additive error while avoiding detection with a certain probability. In this work, we analyse the broader implications of adversarial exploitation in probabilistic truncation protocols, specifically in relation to MaSTer. We propose three attack strategies aimed at inducing misclassification in deep neural network (DNN) inference. Our empirical evaluation across multiple datasets demonstrates that while adversarial influence remains negligible under realistic constraints, certain configurations and network architectures exhibit increased vulnerability. By improving the understanding of the risks associated with probabilistic truncation protocols in privacy-preserving machine learning, our work demonstrates that the MaSTer protocol is robust in realistic settings.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Published elsewhere. Major revision. IH&MMSEC'25
DOI
10.1145/3733102.3733119
Keywords
Multi Party ComputationMachine LearningAttackTruncation
Contact author(s)
martin zbudila @ esat kuleuven be
aysajan abidin @ esat kuleuven be
bart preneel @ esat kuleuven be
History
2025-04-30: approved
2025-04-30: received
See all versions
Short URL
https://ia.cr/2025/773
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/773,
      author = {Martin Zbudila and Aysajan Abidin and Bart Preneel},
      title = {Exploring Adversarial Attacks on the {MaSTer} Truncation Protocol},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/773},
      year = {2025},
      doi = {10.1145/3733102.3733119},
      url = {https://eprint.iacr.org/2025/773}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.