Secure multi-party protocols under a modern lens

Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2013. === Cataloged from PDF version of thesis. === Includes bibliographical references (p. 263-272). === A secure multi-party computation (MPC) protocol for computing a function f allows a group of parties to jointly eval...

Full description

Bibliographic Details
Main Author: Boyle, Elette Chantae
Other Authors: Shafi Goldwasser.
Format: Others
Language:English
Published: Massachusetts Institute of Technology 2013
Subjects:
Online Access:http://hdl.handle.net/1721.1/82436
id ndltd-MIT-oai-dspace.mit.edu-1721.1-82436
record_format oai_dc
spelling ndltd-MIT-oai-dspace.mit.edu-1721.1-824362019-05-02T15:39:32Z Secure multi-party protocols under a modern lens Boyle, Elette Chantae Shafi Goldwasser. Massachusetts Institute of Technology. Department of Mathematics. Massachusetts Institute of Technology. Department of Mathematics. Mathematics. Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2013. Cataloged from PDF version of thesis. Includes bibliographical references (p. 263-272). A secure multi-party computation (MPC) protocol for computing a function f allows a group of parties to jointly evaluate f over their private inputs, such that a computationally bounded adversary who corrupts a subset of the parties can not learn anything beyond the inputs of the corrupted parties and the output of the function f. General MPC completeness theorems in the 1980s showed that every efficiently computable function can be evaluated securely in this fashion [Yao86, GMW87, CCD87, BGW88] using the existence of cryptography. In the following decades, progress has been made toward making MPC protocols efficient enough to be deployed in real-world applications. However, recent technological developments have brought with them a slew of new challenges, from new security threats to a question of whether protocols can scale up with the demand of distributed computations on massive data. Before one can make effective use of MPC, these challenges must be addressed. In this thesis, we focus on two lines of research toward this goal: " Protocols resilient to side-channel attacks. We consider a strengthened adversarial model where, in addition to corrupting a subset of parties, the adversary may leak partial information on the secret states of honest parties during the protocol. In presence of such adversary, we first focus on preserving the correctness guarantees of MPC computations. We then proceed to address security guarantees, using cryptography. We provide two results: an MPC protocol whose security provably "degrades gracefully" with the amount of leakage information obtained by the adversary, and a second protocol which provides complete security assuming a (necessary) one-time preprocessing phase during which leakage cannot occur. * Protocols with scalable communication requirements. We devise MPC protocols with communication locality: namely, each party only needs to communicate with a small (polylog) number of dynamically chosen parties. Our techniques use digital signatures and extend particularly well to the case when the function f is a sublinear algorithm whose execution depends on o(n) of the n parties' inputs. by Elette Chantae Boyle. Ph.D. 2013-11-18T19:23:07Z 2013-11-18T19:23:07Z 2013 2013 Thesis http://hdl.handle.net/1721.1/82436 862965948 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 272 p. application/pdf Massachusetts Institute of Technology
collection NDLTD
language English
format Others
sources NDLTD
topic Mathematics.
spellingShingle Mathematics.
Boyle, Elette Chantae
Secure multi-party protocols under a modern lens
description Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2013. === Cataloged from PDF version of thesis. === Includes bibliographical references (p. 263-272). === A secure multi-party computation (MPC) protocol for computing a function f allows a group of parties to jointly evaluate f over their private inputs, such that a computationally bounded adversary who corrupts a subset of the parties can not learn anything beyond the inputs of the corrupted parties and the output of the function f. General MPC completeness theorems in the 1980s showed that every efficiently computable function can be evaluated securely in this fashion [Yao86, GMW87, CCD87, BGW88] using the existence of cryptography. In the following decades, progress has been made toward making MPC protocols efficient enough to be deployed in real-world applications. However, recent technological developments have brought with them a slew of new challenges, from new security threats to a question of whether protocols can scale up with the demand of distributed computations on massive data. Before one can make effective use of MPC, these challenges must be addressed. In this thesis, we focus on two lines of research toward this goal: " Protocols resilient to side-channel attacks. We consider a strengthened adversarial model where, in addition to corrupting a subset of parties, the adversary may leak partial information on the secret states of honest parties during the protocol. In presence of such adversary, we first focus on preserving the correctness guarantees of MPC computations. We then proceed to address security guarantees, using cryptography. We provide two results: an MPC protocol whose security provably "degrades gracefully" with the amount of leakage information obtained by the adversary, and a second protocol which provides complete security assuming a (necessary) one-time preprocessing phase during which leakage cannot occur. * Protocols with scalable communication requirements. We devise MPC protocols with communication locality: namely, each party only needs to communicate with a small (polylog) number of dynamically chosen parties. Our techniques use digital signatures and extend particularly well to the case when the function f is a sublinear algorithm whose execution depends on o(n) of the n parties' inputs. === by Elette Chantae Boyle. === Ph.D.
author2 Shafi Goldwasser.
author_facet Shafi Goldwasser.
Boyle, Elette Chantae
author Boyle, Elette Chantae
author_sort Boyle, Elette Chantae
title Secure multi-party protocols under a modern lens
title_short Secure multi-party protocols under a modern lens
title_full Secure multi-party protocols under a modern lens
title_fullStr Secure multi-party protocols under a modern lens
title_full_unstemmed Secure multi-party protocols under a modern lens
title_sort secure multi-party protocols under a modern lens
publisher Massachusetts Institute of Technology
publishDate 2013
url http://hdl.handle.net/1721.1/82436
work_keys_str_mv AT boyleelettechantae securemultipartyprotocolsunderamodernlens
_version_ 1719025760325337088