MPC-Friendly Commitments for Publicly Verifiable Covert Security

09/15/2021
by   Nitin Agrawal, et al.
0

We address the problem of efficiently verifying a commitment in a two-party computation. This addresses the scenario where a party P1 commits to a value x to be used in a subsequent secure computation with another party P2 that wants to receive assurance that P1 did not cheat, i.e. that x was indeed the value inputted into the secure computation. Our constructions operate in the publicly verifiable covert (PVC) security model, which is a relaxation of the malicious model of MPC appropriate in settings where P1 faces a reputational harm if caught cheating. We introduce the notion of PVC commitment scheme and indexed hash functions to build commitments schemes tailored to the PVC framework, and propose constructions for both arithmetic and Boolean circuits that result in very efficient circuits. From a practical standpoint, our constructions for Boolean circuits are 60× faster to evaluate securely, and use 36× less communication than baseline methods based on hashing. Moreover, we show that our constructions are tight in terms of required non-linear operations, by proving lower bounds on the nonlinear gate count of commitment verification circuits. Finally, we present a technique to amplify the security properties our constructions that allows to efficiently recover malicious guarantees with statistical security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/05/2019

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction

The concrete efficiency of secure computation has been the focus of many...
research
07/29/2020

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries

Due to the great development of secure multi-party computation, many pra...
research
06/08/2022

Communication Efficient Semi-Honest Three-Party Secure Multiparty Computation with an Honest Majority

In this work, we propose a novel protocol for secure three-party computa...
research
09/16/2019

CrypTFlow: Secure TensorFlow Inference

We present CrypTFlow, a first of its kind system that converts TensorFlo...
research
03/13/2022

Adaptive Gap Entangled Polynomial Coding for Multi-Party Computation at the Edge

Multi-party computation (MPC) is promising for designing privacy-preserv...
research
05/03/2021

Three-Party Integer Comparison and Applications

Secure integer comparison has been a popular research topic in cryptogra...
research
12/30/2021

Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing

Multiparty computation (MPC) consists in several parties engaging in joi...

Please sign up or login with your details

Forgot password? Click here to reset