TU Darmstadt / ULB / TUbiblio

Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater

Brüggemann, Andreas ; Schick, Oliver ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein (2024)
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater.
45th IEEE Symposium on Security and Privacy (IEEE S&P'24). San Francisco, USA (20.05.2024 - 23.05.2024)
doi: 10.1109/SP54263.2024.00164
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Secure multi-party computation (MPC) enables collaboration on sensitive data while maintaining privacy. In real-world scenarios, asymmetric trust assumptions are often most realistic, where one somewhat trustworthy entity interacts with smaller clients. Building upon previous two-party computation (2PC) protocols like MUSE (USENIX Security'21) and SIMC (USENIX Security'22), we focus on three-party computation (3PC) with one malicious party, avoiding the performance limitations of dishonest-majority inherent to 2PC. We introduce two protocols, AUXILIATOR and SOCIUM, in a machine learning (ML) friendly design with a fast online phase and novel verification techniques in the setup phase. These protocols bridge the gap between prior 3PC approaches that considered either fully semi-honest or malicious settings. AUXILIATOR enhances the semi-honest two-party setting with a malicious helper, significantly improving communication by at least two orders of magnitude. SOCIUM extends the client-malicious setting with one malicious client and a semi-honest server, achieving substantial communication improvement by at least one order of magnitude compared to SIMC. Besides an implementation of our new protocols, we provide the first open-source implementation of the semi-honest 3PC protocol ASTRA (CCSW'19) and a variant of the malicious 3PC protocol SWIFT (USENIX Security'21).

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2024
Autor(en): Brüggemann, Andreas ; Schick, Oliver ; Schneider, Thomas ; Suresh, Ajith ; Yalame, Hossein
Art des Eintrags: Bibliographie
Titel: Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater
Sprache: Englisch
Publikationsjahr: Mai 2024
Verlag: IEEE
Buchtitel: Proceedings: 45th IEEE Symposium on Security and Privacy: SP 2024
Veranstaltungstitel: 45th IEEE Symposium on Security and Privacy (IEEE S&P'24)
Veranstaltungsort: San Francisco, USA
Veranstaltungsdatum: 20.05.2024 - 23.05.2024
DOI: 10.1109/SP54263.2024.00164
Zugehörige Links:
Kurzbeschreibung (Abstract):

Secure multi-party computation (MPC) enables collaboration on sensitive data while maintaining privacy. In real-world scenarios, asymmetric trust assumptions are often most realistic, where one somewhat trustworthy entity interacts with smaller clients. Building upon previous two-party computation (2PC) protocols like MUSE (USENIX Security'21) and SIMC (USENIX Security'22), we focus on three-party computation (3PC) with one malicious party, avoiding the performance limitations of dishonest-majority inherent to 2PC. We introduce two protocols, AUXILIATOR and SOCIUM, in a machine learning (ML) friendly design with a fast online phase and novel verification techniques in the setup phase. These protocols bridge the gap between prior 3PC approaches that considered either fully semi-honest or malicious settings. AUXILIATOR enhances the semi-honest two-party setting with a malicious helper, significantly improving communication by at least two orders of magnitude. SOCIUM extends the client-malicious setting with one malicious client and a semi-honest server, achieving substantial communication improvement by at least one order of magnitude compared to SIMC. Besides an implementation of our new protocols, we provide the first open-source implementation of the semi-honest 3PC protocol ASTRA (CCSW'19) and a variant of the malicious 3PC protocol SWIFT (USENIX Security'21).

Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Praktische Kryptographie und Privatheit
DFG-Sonderforschungsbereiche (inkl. Transregio)
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche
DFG-Graduiertenkollegs
DFG-Graduiertenkollegs > Graduiertenkolleg 2050 Privacy and Trust for Mobile Users
DFG-Sonderforschungsbereiche (inkl. Transregio) > Sonderforschungsbereiche > SFB 1119: CROSSING – Kryptographiebasierte Sicherheitslösungen als Grundlage für Vertrauen in heutigen und zukünftigen IT-Systemen
Hinterlegungsdatum: 25 Jul 2024 07:27
Letzte Änderung: 25 Jul 2024 07:27
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen