TY - GEN
T1 - Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application
AU - Ohata, Satsuya
AU - Nuida, Koji
N1 - Publisher Copyright:
© 2020, International Financial Cryptography Association.
PY - 2020
Y1 - 2020
N2 - Secure multi-party computation (MPC) allows a set of parties to compute a function jointly while keeping their inputs private. Compared with the MPC based on garbled circuits, some recent research results show that MPC based on secret sharing (SS) works at a very high speed. Moreover, SS-based MPC can be easily vectorized and achieve higher throughput. In SS-based MPC, however, we need many communication rounds for computing concrete protocols like equality check, less-than comparison, etc. This property is not suited for large-latency environments like the Internet (or WAN). In this paper, we construct semi-honest secure communication-efficient two-party protocols. The core technique is Beaver triple extension, which is a new tool for treating multi-fan-in gates, and we also show how to use it efficiently. We mainly focus on reducing the number of communication rounds, and our protocols also succeed in reducing the number of communication bits (in most cases). As an example, we propose a less-than comparison protocol (under practical parameters) with three communication rounds. Moreover, the number of communication bits is also fewer. As a result, total online execution time is shorter than the previous work adopting the same settings. Although the computation costs of our protocols are more expensive than those of previous work, we confirm via experiments that such a disadvantage has small effects on the whole online performance in the typical WAN environments.
AB - Secure multi-party computation (MPC) allows a set of parties to compute a function jointly while keeping their inputs private. Compared with the MPC based on garbled circuits, some recent research results show that MPC based on secret sharing (SS) works at a very high speed. Moreover, SS-based MPC can be easily vectorized and achieve higher throughput. In SS-based MPC, however, we need many communication rounds for computing concrete protocols like equality check, less-than comparison, etc. This property is not suited for large-latency environments like the Internet (or WAN). In this paper, we construct semi-honest secure communication-efficient two-party protocols. The core technique is Beaver triple extension, which is a new tool for treating multi-fan-in gates, and we also show how to use it efficiently. We mainly focus on reducing the number of communication rounds, and our protocols also succeed in reducing the number of communication bits (in most cases). As an example, we propose a less-than comparison protocol (under practical parameters) with three communication rounds. Moreover, the number of communication bits is also fewer. As a result, total online execution time is shorter than the previous work adopting the same settings. Although the computation costs of our protocols are more expensive than those of previous work, we confirm via experiments that such a disadvantage has small effects on the whole online performance in the typical WAN environments.
UR - http://www.scopus.com/inward/record.url?scp=85089218960&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85089218960&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-51280-4_20
DO - 10.1007/978-3-030-51280-4_20
M3 - Conference contribution
AN - SCOPUS:85089218960
SN - 9783030512798
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 369
EP - 385
BT - Financial Cryptography and Data Security - 24th International Conference, FC 2020, Revised Selected Papers
A2 - Bonneau, Joseph
A2 - Heninger, Nadia
PB - Springer
T2 - 24th International Conference on Financial Cryptography and Data Security, FC 2020
Y2 - 10 February 2020 through 14 February 2020
ER -