90 likes | 233 Views
Efficient Non-Interactive Secure Computation. Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva. Two-Message 2PC. First Message. Second Message. Yaremchuk. Basim. Even Better: Reuse 1 st Message. First Message. 2. 1. 3. What is Known?. Semi-honest Yao is a NISC
E N D
Efficient Non-Interactive Secure Computation ArashAfshar and PaymanMohassel and Benny Pinkas and Ben Riva
Two-Message 2PC First Message Second Message Yaremchuk Basim
Even Better:Reuse 1st Message First Message
2 1 3
What is Known? • Semi-honest Yao is a NISC • Malicious NISC is feasible • [IKO+2011]
Cut-and-Choose 2PC Evaluate Open Majority
Its Interactive • Cut-and-choose • Input-consistency checks • Cheating recovery techniques • We make it all non-interactive • Under DDH assumption
Implementation • On Standard Laptop • Read/Write messages to/from file • Malicious NISC for AES: ~6.4 sec. • Malicious NISC for SHA256: ~17.6 sec.