2018
DOI: 10.1007/978-3-030-03332-3_4
|View full text |Cite
|
Sign up to set email alerts
|

Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)

Abstract: In this work we develop a new theory for concretely efficient, largescale MPC with active security. Current practical techniques are mostly in the strong setting of all-but-one corruptions, which leads to protocols that scale badly with the number of parties. To work around this issue, we consider a large-scale scenario where a small minority out of many parties is honest and design scalable, more efficient MPC protocols for this setting. Our results are achieved by introducing new techniques for information-t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…For example, at the time of writing (2021), the most efficient, practical, n-party BMR style protocols are HSS [HSS17] and WRK [WRK17b]; both of which are based on Tiny-OT for the underlying protocol to produce the shared garbling. Tiny-OT was also applied in the Tiny-Keys extensions to the above protocols [HOSS18a,HOSS18b]. Tiny-OT also forms the basis of the two party protocol [WRK17a].…”
Section: Impactmentioning
confidence: 99%
“…For example, at the time of writing (2021), the most efficient, practical, n-party BMR style protocols are HSS [HSS17] and WRK [WRK17b]; both of which are based on Tiny-OT for the underlying protocol to produce the shared garbling. Tiny-OT was also applied in the Tiny-Keys extensions to the above protocols [HOSS18a,HOSS18b]. Tiny-OT also forms the basis of the two party protocol [WRK17a].…”
Section: Impactmentioning
confidence: 99%
“…This reflects the fact that a malicious sender in F mal-t -PPRF can try to guess subsets containing the receiver's α j inputs, which correspond to non-zero coordinates of the error vector. This assumption with leakage is essentially the same as an assumption recently used for maliciously secure MPC based on syndrome decoding [34]. For a formal definition we refer to the full version.…”
Section: Inputsmentioning
confidence: 99%
“…Data modifications can lead to mining errors if random noise is used [17] or may become complex when using homomorphic data encryption [18]. Instead, in PP-Overgrid, we employ the second approach based on Multi-Party Computation (MPC) protocols [19]. These algorithms were developed for aggregating information collected from multiple users, without disclosing any information of the single users.…”
Section: Privacy-preserving Schemesmentioning
confidence: 99%