Preprocessing Based Verification of Multiparty Protocols with Honest Majority
This paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction performs best with a small number of parties, and its main bene...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2017-10-01
|
Series: | Proceedings on Privacy Enhancing Technologies |
Subjects: | |
Online Access: | https://doi.org/10.1515/popets-2017-0038 |
id |
doaj-5c6e94c4bf704d479f0f00d87c5b82f6 |
---|---|
record_format |
Article |
spelling |
doaj-5c6e94c4bf704d479f0f00d87c5b82f62021-09-05T13:59:52ZengSciendoProceedings on Privacy Enhancing Technologies2299-09842017-10-0120174237610.1515/popets-2017-0038popets-2017-0038Preprocessing Based Verification of Multiparty Protocols with Honest MajorityLaud Peeter0Pankova Alisa1Jagomägis Roman2Cybernetica ASCybernetica AS, University of Tartu, STACCCybernetica ASThis paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction performs best with a small number of parties, and its main benefit is the total cost of the online and the offline phases. In the preprocessing phase, each party generates and shares a sufficient amount of verified multiplication triples that will be later used to assist that party’s proof. The execution phase, after which the computed result is already available to the parties, has only negligible overhead that comes from signatures on sent messages. In the postprocessing phase, the verifiers repeat the computation of the prover in secret-shared manner, checking that they obtain the same messages that the prover sent out during execution. The verification preserves the privacy guarantees of the original protocol. It is applicable to protocols doing computations over finite rings, even if the same protocol performs its computation over several distinct rings. We apply our verification method to the Sharemind platform for secure multiparty computations (SMC), evaluate its performance and compare it to other existing SMC platforms offering security against stronger than passive attackers.https://doi.org/10.1515/popets-2017-0038secure multiparty computationcovert security |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Laud Peeter Pankova Alisa Jagomägis Roman |
spellingShingle |
Laud Peeter Pankova Alisa Jagomägis Roman Preprocessing Based Verification of Multiparty Protocols with Honest Majority Proceedings on Privacy Enhancing Technologies secure multiparty computation covert security |
author_facet |
Laud Peeter Pankova Alisa Jagomägis Roman |
author_sort |
Laud Peeter |
title |
Preprocessing Based Verification of Multiparty Protocols with Honest Majority |
title_short |
Preprocessing Based Verification of Multiparty Protocols with Honest Majority |
title_full |
Preprocessing Based Verification of Multiparty Protocols with Honest Majority |
title_fullStr |
Preprocessing Based Verification of Multiparty Protocols with Honest Majority |
title_full_unstemmed |
Preprocessing Based Verification of Multiparty Protocols with Honest Majority |
title_sort |
preprocessing based verification of multiparty protocols with honest majority |
publisher |
Sciendo |
series |
Proceedings on Privacy Enhancing Technologies |
issn |
2299-0984 |
publishDate |
2017-10-01 |
description |
This paper presents a generic “GMW-style” method for turning passively secure protocols into protocols secure against covert attacks, adding relatively cheap offline preprocessing and post-execution verification phases. Our construction performs best with a small number of parties, and its main benefit is the total cost of the online and the offline phases. In the preprocessing phase, each party generates and shares a sufficient amount of verified multiplication triples that will be later used to assist that party’s proof. The execution phase, after which the computed result is already available to the parties, has only negligible overhead that comes from signatures on sent messages. In the postprocessing phase, the verifiers repeat the computation of the prover in secret-shared manner, checking that they obtain the same messages that the prover sent out during execution. The verification preserves the privacy guarantees of the original protocol. It is applicable to protocols doing computations over finite rings, even if the same protocol performs its computation over several distinct rings. We apply our verification method to the Sharemind platform for secure multiparty computations (SMC), evaluate its performance and compare it to other existing SMC platforms offering security against stronger than passive attackers. |
topic |
secure multiparty computation covert security |
url |
https://doi.org/10.1515/popets-2017-0038 |
work_keys_str_mv |
AT laudpeeter preprocessingbasedverificationofmultipartyprotocolswithhonestmajority AT pankovaalisa preprocessingbasedverificationofmultipartyprotocolswithhonestmajority AT jagomagisroman preprocessingbasedverificationofmultipartyprotocolswithhonestmajority |
_version_ |
1717812820468301824 |