TY - GEN
T1 - Constant-round client-aided secure comparison protocol
AU - Morita, Hiraku
AU - Attrapadung, Nuttapong
AU - Teruya, Tadanori
AU - Ohata, Satsuya
AU - Nuida, Koji
AU - Hanaoka, Goichiro
N1 - Publisher Copyright:
© 2018, Springer Nature Switzerland AG.
PY - 2018
Y1 - 2018
N2 - We present an improved constant-round secure two-party protocol for integer comparison functionality, which is one of the most fundamental building blocks in secure computation. Our protocol is in the so-called client-server model, which is utilized in real-world MPC products such as Sharemind, where any number of clients can create shares of their input and distribute to the servers who then jointly compute over the shares and return the shares of result to the client. In the client-aided client-server model, as mentioned briefly by Mohassel and Zhang (S&P’17), a client further generates and distributes some necessary correlated randomness to servers. Such correlated randomness admits efficient protocols since otherwise servers have to jointly generate randomness by themselves, which can be inefficient. In this paper, we improve the state-of-the-art constant-round comparison protocols by Damgård et al. (TCC’06) and Nishide and Ohta (PKC’07) in the client-aided model. Our techniques include identifying correlated randomness in these comparison protocols. Along the way, we also use tree-based techniques for a building block, which deviate from the above two works. Our proposed protocol requires only 5 communication rounds, regardless of the bit length of inputs. This is at least 5 times fewer rounds than existing protocols. We implement our secure comparison protocol in C++. Our experimental results show that this low-round complexity benefits in low-latency networks such as WAN.
AB - We present an improved constant-round secure two-party protocol for integer comparison functionality, which is one of the most fundamental building blocks in secure computation. Our protocol is in the so-called client-server model, which is utilized in real-world MPC products such as Sharemind, where any number of clients can create shares of their input and distribute to the servers who then jointly compute over the shares and return the shares of result to the client. In the client-aided client-server model, as mentioned briefly by Mohassel and Zhang (S&P’17), a client further generates and distributes some necessary correlated randomness to servers. Such correlated randomness admits efficient protocols since otherwise servers have to jointly generate randomness by themselves, which can be inefficient. In this paper, we improve the state-of-the-art constant-round comparison protocols by Damgård et al. (TCC’06) and Nishide and Ohta (PKC’07) in the client-aided model. Our techniques include identifying correlated randomness in these comparison protocols. Along the way, we also use tree-based techniques for a building block, which deviate from the above two works. Our proposed protocol requires only 5 communication rounds, regardless of the bit length of inputs. This is at least 5 times fewer rounds than existing protocols. We implement our secure comparison protocol in C++. Our experimental results show that this low-round complexity benefits in low-latency networks such as WAN.
KW - Client-aided method
KW - Client-server model
KW - Constant rounds
KW - GMW secret sharing
KW - Less-than comparison
KW - Multi-party computation
UR - http://www.scopus.com/inward/record.url?scp=85051839492&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85051839492&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-98989-1_20
DO - 10.1007/978-3-319-98989-1_20
M3 - Conference contribution
AN - SCOPUS:85051839492
SN - 9783319989884
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 395
EP - 415
BT - Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings
A2 - Zhou, Jianying
A2 - Soriano, Miguel
A2 - Lopez, Javier
PB - Springer Verlag
T2 - 23rd European Symposium on Research in Computer Security, ESORICS 2018
Y2 - 3 September 2018 through 7 September 2018
ER -