1. Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier 2017 MPC Oakland
    T. Araki, A. Barak, J. Furukawa, T. Lichter, Y. Lindell, A. Nof, K. Ohara, A. Watzman and O. Weinstein
    [View PDF on ieeexplore.ieee.org]
    [Show BibTex Citation]

    @INPROCEEDINGS{7958613,
    author={T. {Araki} and A. {Barak} and J. {Furukawa} and T. {Lichter} and Y. {Lindell} and A. {Nof} and K. {Ohara} and A. {Watzman} and O. {Weinstein}},
    booktitle={2017 IEEE Symposium on Security and Privacy (SP)},
    title={Optimized Honest-Majority MPC for Malicious Adversaries — Breaking the 1 Billion-Gate Per Second Barrier},
    year={2017},
    volume={},
    number={},
    pages={843-862},
    keywords={cache storage;combinatorial mathematics;cryptographic protocols;formal specification;logic gates;optimisation;honest majority MPC optimization;malicious adversaries;secure multiparty computation;secure computation protocols;protocol specification;cut-and-choose protocols;AND gate;cache efficiency shuffling;combinatorial analysis;AES encryptions;Protocols;Logic gates;Throughput;Electronic mail;Bandwidth;Cryptography},
    doi={10.1109/SP.2017.15},
    ISSN={2375-1207},
    month={May},
    }

Secure multiparty computation enables a set of parties to securely carry out a joint computation of their private inputs without revealing anything but the output. In the past few years, the efficiency of secure computation protocols has increased in leaps and bounds. However, when considering the case of security in the presence of malicious adversaries (who may arbitrarily deviate from the protocol specification), we are still very far from achieving high efficiency. In this paper, we consider the specific case of three parties and an honest majority. We provide general techniques for improving efficiency of cut-and-choose protocols on multiplication triples and utilize them to significantly improve the recently published protocol of Furukawa et al. (ePrint 2016/944). We reduce the bandwidth of their protocol down from 10 bits per AND gate to 7 bits per AND gate, and show how to improve some computationally expensive parts of their protocol. Most notably, we design cache-efficient shuffling techniques for implementing cut-and-choose without randomly permuting large arrays (which is very slow due to continual cache misses). We provide a combinatorial analysis of our techniques, bounding the cheating probability of the adversary. Our implementation achieves a rate of approximately 1.15 billion AND gates per second on a cluster of three 20-core machines with a lOGbps network. Thus, we can securely compute 212,000 AES encryptions per second (which is hundreds of times faster than previous work for this setting). Our results demonstrate that high-throughput secure computation for malicious adversaries is possible.

  1.