Efficient Non-Interactive Secure Computation in Two-Message 2PC: Enhancements and Implementation
This work presents advancements in non-interactive secure computation (NISC) through an efficient two-message protocol. We address challenges regarding semi-honest and malicious settings, introducing solutions like cut-and-choose techniques and input-consistency checks. Our implementation operates under the DDH assumption on standard laptop hardware, achieving significant performance improvements for malicious NISC in AES (~6.4 seconds) and SHA256 (~17.6 seconds). This research not only establishes a new benchmark for NISC protocols but also exemplifies the practicality of secure computation in real-world applications.
Efficient Non-Interactive Secure Computation in Two-Message 2PC: Enhancements and Implementation
E N D
Presentation Transcript
Efficient Non-Interactive Secure Computation ArashAfshar and PaymanMohassel and Benny Pinkas and Ben Riva
Two-Message 2PC First Message Second Message Yaremchuk Basim
Even Better:Reuse 1st Message First Message
2 1 3
What is Known? • Semi-honest Yao is a NISC • Malicious NISC is feasible • [IKO+2011]
Cut-and-Choose 2PC Evaluate Open Majority
Its Interactive • Cut-and-choose • Input-consistency checks • Cheating recovery techniques • We make it all non-interactive • Under DDH assumption
Implementation • On Standard Laptop • Read/Write messages to/from file • Malicious NISC for AES: ~6.4 sec. • Malicious NISC for SHA256: ~17.6 sec.