340 likes | 354 Views
This paper discusses the construction of round-optimal multi-party computation protocols without the need for setup, ensuring correctness and security against malicious adversaries.
E N D
CRYPTO 2018 Round-Optimal Secure Multi-Party Computation WITHOUT Setup Shai Halevi, IBM CarmitHazay, Bar Ilan University Antigoni Polychroniadou, Cornell Tech MuthuramakrishnanVenkitasubramaniam, University of Rochester
Secure Multi-Party Computation (MPC) f(x1, x2, x3, x4) = (y1, y2 ,y3 ,y4 ) x1 x1 x1 y4 y1 x4 • Goal: • Correctness: Everyone computes f(x1,…,x4) • Security: Nothing else but the output is revealed Adversary PPT Malicious Static x2 y3 y2 x3
4-round • Can we construct round-optimal MPC protocols? f(x1, x2, x3, x4) = (y1, y2 ,y3 ,y4 ) x1 x1 x1 y4 Without setup y1 x4 In the presence of malicious adversaries • Goal: • Correctness: Everyone computes f(x1,…,x4) • Security: Nothing else but the output is revealed Adversary PPT Malicious Static Under standard (polytime) assumptions x2 [GMPP16]: 4 rounds are necessary with black box simulation y3 y2 x3
State-of-the-Art Can we construct 4-round MPC protocols? [BMR] O(1)-round protocols 4-round protocols 5-round protocols 6-round protocol [KOS03, KO04, Pas04,DI05,DI06, IPS08,Wee10, Goy11,LP11, GLOV12] 1st O(1)-round Protocol* [ACJ17, BHP17] [ACJ17, BL18] [GMPP] Lower Bound: 4 rounds [GMW] O(dF)-round protocol 2017-2018 2016 1990 2003-2012 1987 Lower Bound: 5 rounds for sequential 2PC [KO04,ORS15] *Honest majority
4-round • Can we construct round-optimal MPC protocols? f(x1, x2, x3, x4) = (y1, y2 ,y3 ,y4 ) x1 x1 x1 y4 Without setup y1 x4 In the presence of malicious adversaries • Goal: • Correctness: Everyone computes f(x1,…,x4) • Security: Nothing else but the output is revealed Adversary PPT Malicious Static Under standard (polytime) assumptions x2 [GMPP16]: 4 rounds are necessary with black box simulation y3 y2 x3
Our Results Theorem (informal) Injective OWFs + ZAPS + AHE4-round malicious MPC QR 4-round malicious MPC Corollary (informal) ETDP + LWE/QR/DDH/DCR 4-round malicious MPC Concurrent work [BGJKKS]: Injective OWFs + dense cryptosystems + 2-round OT 4-round malicious MPC Corollary: QR/DDH/DCR/LWE 4-round malicious MPC
GMW paradigm compilation (1) [ACJ17 ,BL18]: 4-round (or 2-round) semi-malicious MPC [GS18, BL18] Delayed input 4-round NMZK 5-round malicious MPC NMZK NMZK MPC MPC
GMW paradigm compilation (2) [ACJ17,BHP17]: 4-round (or 3-round) semi-malicious MPC Delayed input 3-round NMZK with complexity leveraging 4-round malicious MPC from sub-exponential assumptions NMZK MPC NMZK
GMW paradigm compilation (2) [ACJ17,BHP17]: 4-round (or 2-round) semi-malicious MPC Delayed input 3-round ‘NMZK’ with complexity leveraging 3-round ZK proofs impossible [GK96] 4-round malicious MPC from sub-exponential assumptions MPC NMZK NMZK
Our Approach 4-round WI-friendly semi-malicious MPC 3-round NMWI primitive 3-round ZK proofs impossible 4-round malicious MPC MPC NMWI NMZK
Our Approach in a nutshell Semi-malicious MPC Design NMWI* Incorporate Naor-Yung Tolerate additive errors
Our Approach in a nutshell Secure comp. of reduces to secure comp. of randomized encoding (RE) of 3-bit MULT protocol based on 2-round oblivious transfer [ACJ17] • Q: Randomized Encoding with degree 3? • A: 3-bit multiplication protocol 3MULT based on 2-round OT [ACJ17] 3MULT 3MULT 3MULT … f(x)
Our Approach in a nutshell Q: Can we replace ZK by WI? (Unlike ZK proofs, in WI proofs the simulator must follow the real prover strategy with a real witness) A: Modify 3MULT using the Naor-Yung paradigm NM ZK NMWI 3MULT 3MULT 3MULT 3MULT 3MULT 3MULT …
Our Approach in a nutshell To accommodate WI proofs we need to weaken the correctness guarantees Q: Can we protect against all adversarial attacks? A: Adversary can include additive errors in the computation. NMWI Double 3MULT Double 3MULT Double 3MULT …
Our Approach in a nutshell Randomized Encoding with degree 3 Achieve ‘NMWI’ using 3-round weak NMCOMs Modify weak NMCOM using the NY Paradigm 3-bit3MULT protocol via 2-round OT Modify 3MULT using the NYParadigm Tolerate additive errors Weaken correctness guarantees in WI proofs do not protect against all adversarial attacks. Replace ZK by WI + Require Sender Equivocal OT ( via Additive HE)
Starting Point:3-party 3-bit multiplication protocol (3MULT) [Yuval+ACJ17] Theorem (informal) [ACJ17]: Assuming 2-round OT, there is a 3-round 3-bit multiplication protocol 3MULT P2(x2) P1(x1) P3(x3) OTα OTβ OTγ
Double 3MULT using the NY Paradigm Double 3MULT P1(x1) P3(x3) P2(x2) OTα OTα' OTβ' OTβ OTγ' OTγ
Double 3MULT using the NY Paradigm Double 3MULT P1(x1) P3(x3) P2(x2) OTα OTα' OTβ' OTβ OTγ' OTγ Need to weaken the WI statement
Tolerate Additive Errors Build a RE encoding secure against additive attacks Cannot use directly compilers [GIPST14,GIP15, GIW16] STAGE 1 1 Choose RE and massage double 3MULT so that additive errors reduce to additive errors on the underlying circuit C. C’ STAGE 2 2 C Precompileunderlying circuit using [GIPST14,GIP15,GIW16]
Conclusion Round-optimal MPC protocol: Without setup In the presence of malicious adversaries Under standard (polytime) assumptions Theorem (informal) ETDP + QR/LWE/DDH/DCR 4-round malicious MPC QR 4-round malicious MPC
Open Problems 4-round malicious MPC from minimal assumptions (4-round malicious OT) 4-round MPC
Our Approach in a nutshell Q: How can we achieve extraction and WI with non-malleability guarantees? A: Extract via a 3-round weak non-malleable commitment [GRRV14] Modify 3-round weak NMCOM using the Naor-Yung paradigm Make weak NMCOM rewinding safe NM Com NMWI Double 3MULT Double 3MULT Double 3MULT NM Com …
Circuits resilient to additive attacks [GIPST14,GIP15,GIW16] Any additive attack on C’ translates to an equivalent additive attack on the inputs of C’ C + + - - +1 +1 +1 X X +1 X X -1 X X C’
Circuits resilient to additive attacks [GIPST14,GIP15,GIW16] Any additive attack on C’ translates to an equivalent additive attack on the inputs of C’ C + + - - +1 +1 +1 X X +1 X X -1 X X C’
Starting Point:3-party 3-bit multiplication protocol (3MULT) [Yuval+ACJ17] Theorem (informal) [ACJ17]: Assuming 2-round OT, there is a 3-round 3-bit multiplication protocol P3(x3) P2(x2;r2,s2) P1(x1;s1) OTα OTβ u=x1x2-r2 v=r2x3-s2 OΤβ[P3(x3), P2(-s2,r2-s2)] OTα[P1(x1), P2(-r2,x2-r2)] OTγ[P3(x3), P1(-s1,u-s1)] OTγ w=ux3-s1 v+w s2 s1 w v u s2 +s1+ r2x3-s2 +(x1x2-r2)x3-s1 = x1x2x3 Output
Double 3MULT using the NY Paradigm P3(x3) P2(x2;r2,s2) P1(x1;s1) v u OTγ' OTγ OTα OTα' OTβ' OTβ w v+w s2 s1 Receiver sets same input in both OTs Sendersecret shares its input across the OTs
Double 3MULT using the NY Paradigm P3(x3) P2(x2;r2,s2) P1(x1;s1) x1 x3 x1 x3 v u x3 x3 w v+w s2 s1 Receiver sets same input in both OTs Sendersecret shares its input across the OTs
Incorporating NMWI NM WI There is a “” problem
Incorporating NMWI NM WI Problem: 3rd-round message depends on Solution: Don’t enforce correctness with
So what if is not correct P3(x3) P2(x2;r2,s2) P1(x1;s1) x1 x3 v u x1x2-r2 r2x3-s2 x3 w ux3-s1 v+w s2 s1
So what if is not correct P3(x3) P2(x2;r2,s2) P1(x1;s1) x1 x3 v u x1x2-r2 r2x3-s2 x3 w u'x3-s1 v+w s2 s1 An incorrect results in
Weak correctness guarantees: Sender P3(x3) P2(x2;r2,s2) P1(x1;s1) x1 x3 x1 x3 v u x3 x3 w v+w s2 s1 Rely on special OT that information theoretically hides the sender’s ``other’’ input