Preprocessing Based Verification of Multiparty Protocols with Honest Majority

This paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction performs best with a small number of parties, and its main bene...

Full description

Bibliographic Details
Main Authors: Laud Peeter, Pankova Alisa, Jagomägis Roman
Format: Article
Language:English
Published: Sciendo 2017-10-01
Series:Proceedings on Privacy Enhancing Technologies
Subjects:
Online Access:https://doi.org/10.1515/popets-2017-0038
id doaj-5c6e94c4bf704d479f0f00d87c5b82f6
record_format Article
spelling doaj-5c6e94c4bf704d479f0f00d87c5b82f62021-09-05T13:59:52ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842017-10-0120174237610.1515/popets-2017-0038popets-2017-0038Preprocessing Based Verification of Multiparty Protocols with Honest MajorityLaud Peeter0Pankova Alisa1Jagomägis Roman2Cybernetica ASCybernetica AS, University of Tartu, STACCCybernetica ASThis paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction performs best with a small number of parties, and its main benefit is the total cost of the online and the offline phases. In the preprocessing phase, each party generates and shares a sufficient amount of verified multiplication triples that will be later used to assist that party’s proof. The execution phase, after which the computed result is already available to the parties, has only negligible overhead that comes from signatures on sent messages. In the postprocessing phase, the verifiers repeat the computation of the prover in secret-shared manner, checking that they obtain the same messages that the prover sent out during execution. The verification preserves the privacy guarantees of the original protocol. It is applicable to protocols doing computations over finite rings, even if the same protocol performs its computation over several distinct rings. We apply our verification method to the Sharemind platform for secure multiparty computations (SMC), evaluate its performance and compare it to other existing SMC platforms offering security against stronger than passive attackers.https://doi.org/10.1515/popets-2017-0038secure multiparty computationcovert security
collection DOAJ
language English
format Article
sources DOAJ
author Laud Peeter
Pankova Alisa
Jagomägis Roman
spellingShingle Laud Peeter
Pankova Alisa
Jagomägis Roman
Preprocessing Based Verification of Multiparty Protocols with Honest Majority
Proceedings on Privacy Enhancing Technologies
secure multiparty computation
covert security
author_facet Laud Peeter
Pankova Alisa
Jagomägis Roman
author_sort Laud Peeter
title Preprocessing Based Verification of Multiparty Protocols with Honest Majority
title_short Preprocessing Based Verification of Multiparty Protocols with Honest Majority
title_full Preprocessing Based Verification of Multiparty Protocols with Honest Majority
title_fullStr Preprocessing Based Verification of Multiparty Protocols with Honest Majority
title_full_unstemmed Preprocessing Based Verification of Multiparty Protocols with Honest Majority
title_sort preprocessing based verification of multiparty protocols with honest majority
publisher Sciendo
series Proceedings on Privacy Enhancing Technologies
issn 2299-0984
publishDate 2017-10-01
description This paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction performs best with a small number of parties, and its main benefit is the total cost of the online and the offline phases. In the preprocessing phase, each party generates and shares a sufficient amount of verified multiplication triples that will be later used to assist that party’s proof. The execution phase, after which the computed result is already available to the parties, has only negligible overhead that comes from signatures on sent messages. In the postprocessing phase, the verifiers repeat the computation of the prover in secret-shared manner, checking that they obtain the same messages that the prover sent out during execution. The verification preserves the privacy guarantees of the original protocol. It is applicable to protocols doing computations over finite rings, even if the same protocol performs its computation over several distinct rings. We apply our verification method to the Sharemind platform for secure multiparty computations (SMC), evaluate its performance and compare it to other existing SMC platforms offering security against stronger than passive attackers.
topic secure multiparty computation
covert security
url https://doi.org/10.1515/popets-2017-0038
work_keys_str_mv AT laudpeeter preprocessingbasedverificationofmultipartyprotocolswithhonestmajority
AT pankovaalisa preprocessingbasedverificationofmultipartyprotocolswithhonestmajority
AT jagomagisroman preprocessingbasedverificationofmultipartyprotocolswithhonestmajority
_version_ 1717812820468301824