Secure multi-party protocols under a modern lens
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2013. === Cataloged from PDF version of thesis. === Includes bibliographical references (p. 263-272). === A secure multi-party computation (MPC) protocol for computing a function f allows a group of parties to jointly eval...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | English |
Published: |
Massachusetts Institute of Technology
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/82436 |
id |
ndltd-MIT-oai-dspace.mit.edu-1721.1-82436 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-MIT-oai-dspace.mit.edu-1721.1-824362019-05-02T15:39:32Z Secure multi-party protocols under a modern lens Boyle, Elette Chantae Shafi Goldwasser. Massachusetts Institute of Technology. Department of Mathematics. Massachusetts Institute of Technology. Department of Mathematics. Mathematics. Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2013. Cataloged from PDF version of thesis. Includes bibliographical references (p. 263-272). A secure multi-party computation (MPC) protocol for computing a function f allows a group of parties to jointly evaluate f over their private inputs, such that a computationally bounded adversary who corrupts a subset of the parties can not learn anything beyond the inputs of the corrupted parties and the output of the function f. General MPC completeness theorems in the 1980s showed that every efficiently computable function can be evaluated securely in this fashion [Yao86, GMW87, CCD87, BGW88] using the existence of cryptography. In the following decades, progress has been made toward making MPC protocols efficient enough to be deployed in real-world applications. However, recent technological developments have brought with them a slew of new challenges, from new security threats to a question of whether protocols can scale up with the demand of distributed computations on massive data. Before one can make effective use of MPC, these challenges must be addressed. In this thesis, we focus on two lines of research toward this goal: " Protocols resilient to side-channel attacks. We consider a strengthened adversarial model where, in addition to corrupting a subset of parties, the adversary may leak partial information on the secret states of honest parties during the protocol. In presence of such adversary, we first focus on preserving the correctness guarantees of MPC computations. We then proceed to address security guarantees, using cryptography. We provide two results: an MPC protocol whose security provably "degrades gracefully" with the amount of leakage information obtained by the adversary, and a second protocol which provides complete security assuming a (necessary) one-time preprocessing phase during which leakage cannot occur. * Protocols with scalable communication requirements. We devise MPC protocols with communication locality: namely, each party only needs to communicate with a small (polylog) number of dynamically chosen parties. Our techniques use digital signatures and extend particularly well to the case when the function f is a sublinear algorithm whose execution depends on o(n) of the n parties' inputs. by Elette Chantae Boyle. Ph.D. 2013-11-18T19:23:07Z 2013-11-18T19:23:07Z 2013 2013 Thesis http://hdl.handle.net/1721.1/82436 862965948 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 272 p. application/pdf Massachusetts Institute of Technology |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Mathematics. |
spellingShingle |
Mathematics. Boyle, Elette Chantae Secure multi-party protocols under a modern lens |
description |
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2013. === Cataloged from PDF version of thesis. === Includes bibliographical references (p. 263-272). === A secure multi-party computation (MPC) protocol for computing a function f allows a group of parties to jointly evaluate f over their private inputs, such that a computationally bounded adversary who corrupts a subset of the parties can not learn anything beyond the inputs of the corrupted parties and the output of the function f. General MPC completeness theorems in the 1980s showed that every efficiently computable function can be evaluated securely in this fashion [Yao86, GMW87, CCD87, BGW88] using the existence of cryptography. In the following decades, progress has been made toward making MPC protocols efficient enough to be deployed in real-world applications. However, recent technological developments have brought with them a slew of new challenges, from new security threats to a question of whether protocols can scale up with the demand of distributed computations on massive data. Before one can make effective use of MPC, these challenges must be addressed. In this thesis, we focus on two lines of research toward this goal: " Protocols resilient to side-channel attacks. We consider a strengthened adversarial model where, in addition to corrupting a subset of parties, the adversary may leak partial information on the secret states of honest parties during the protocol. In presence of such adversary, we first focus on preserving the correctness guarantees of MPC computations. We then proceed to address security guarantees, using cryptography. We provide two results: an MPC protocol whose security provably "degrades gracefully" with the amount of leakage information obtained by the adversary, and a second protocol which provides complete security assuming a (necessary) one-time preprocessing phase during which leakage cannot occur. * Protocols with scalable communication requirements. We devise MPC protocols with communication locality: namely, each party only needs to communicate with a small (polylog) number of dynamically chosen parties. Our techniques use digital signatures and extend particularly well to the case when the function f is a sublinear algorithm whose execution depends on o(n) of the n parties' inputs. === by Elette Chantae Boyle. === Ph.D. |
author2 |
Shafi Goldwasser. |
author_facet |
Shafi Goldwasser. Boyle, Elette Chantae |
author |
Boyle, Elette Chantae |
author_sort |
Boyle, Elette Chantae |
title |
Secure multi-party protocols under a modern lens |
title_short |
Secure multi-party protocols under a modern lens |
title_full |
Secure multi-party protocols under a modern lens |
title_fullStr |
Secure multi-party protocols under a modern lens |
title_full_unstemmed |
Secure multi-party protocols under a modern lens |
title_sort |
secure multi-party protocols under a modern lens |
publisher |
Massachusetts Institute of Technology |
publishDate |
2013 |
url |
http://hdl.handle.net/1721.1/82436 |
work_keys_str_mv |
AT boyleelettechantae securemultipartyprotocolsunderamodernlens |
_version_ |
1719025760325337088 |