Proceedings of the Forty-Sixth Annual ACM Symposium on Theory of Computing 2014
DOI: 10.1145/2591796.2591861
|View full text |Cite
|
Sign up to set email alerts
|

Circuits resilient to additive attacks with applications to secure computation

Abstract: We study the question of protecting arithmetic circuits against additive attacks, which can add an arbitrary fixed value to each wire in the circuit. This extends the notion of algebraic manipulation detection (AMD) codes, which protect information against additive attacks, to that of AMD circuits which protect computation.We present a construction of such AMD circuits: any arithmetic circuit C over a finite field F can be converted into a functionally-equivalent randomized arithmetic circuit C of size O(|C|) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 80 publications
(55 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…Proof. The client-aided two-party secure computation protocol used (i.e., client-supplied correlated randomness, combined with Rounds 1 & 2) is secure against a malicious server, up to additive offsets to inputs and outputs of the computation [9,11,34]. Note that an additive offset to the output is irrelevant for client privacy (recall that we do not address robustness of the computation against a malicious server).…”
Section: Claim C1 (Malicious Client)mentioning
confidence: 99%
“…Proof. The client-aided two-party secure computation protocol used (i.e., client-supplied correlated randomness, combined with Rounds 1 & 2) is secure against a malicious server, up to additive offsets to inputs and outputs of the computation [9,11,34]. Note that an additive offset to the output is irrelevant for client privacy (recall that we do not address robustness of the computation against a malicious server).…”
Section: Claim C1 (Malicious Client)mentioning
confidence: 99%
“…We denote reconstruction failures by ⊥ and we expect that the modification operator is such that a δ ⊥ = ⊥ and ⊥ δ a = ⊥ for any a in the value domain. Modification function generalises the observation that in many MPC protocols adversarial modifications result in additive changes to the value [57].…”
Section: Definition 2 (Hiding Storage)mentioning
confidence: 99%
“…Considering adversaries that access the memory of such circuits in a block-wise manner, is a plausible scenario. In terms of modeling, this is similar to tamper-resilience for arithmetic circuits [33], in which the attacker, instead of accessing individual circuit wires carrying bits, it accesses wires carrying integers. The case is similar for RAM computation where the CPU operates over 32 or 64 bit registers (securing RAM programs using NMC was also considered by [22][23][24]31]).…”
Section: Applicationsmentioning
confidence: 99%