2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00078
|View full text |Cite
|
Sign up to set email alerts
|

New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning

Abstract: At CRYPTO 2018 Cramer et al. presented SPDZ 2 k , a new secret-sharing based protocol for actively secure multi-party computation against a dishonest majority, that works over rings instead of fields. Their protocol uses slightly more communication than competitive schemes working over fields. However, their approach allows for arithmetic to be carried out using native 32 or 64-bit CPU operations rather than modulo a large prime. The authors thus conjectured that the increased communication would be more than… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
87
0
1

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 93 publications
(89 citation statements)
references
References 43 publications
(100 reference statements)
1
87
0
1
Order By: Relevance
“…This observation has been confirmed in practice [13]. For example, for replicated secret sharing, protocols over rings like Z/2 64 Z can provide up to 8× savings in runtime and memory usage with respect to the field counterpart for some specific applications like neural network evaluation, which are heavy in terms of comparisons [2].…”
Section: Introductionmentioning
confidence: 84%
“…This observation has been confirmed in practice [13]. For example, for replicated secret sharing, protocols over rings like Z/2 64 Z can provide up to 8× savings in runtime and memory usage with respect to the field counterpart for some specific applications like neural network evaluation, which are heavy in terms of comparisons [2].…”
Section: Introductionmentioning
confidence: 84%
“…Secure inference of decision trees using MPC has been explored in various works (e.g., [8,11]), and we briefly discuss this in Appendix A.5.3.…”
Section: Related Workmentioning
confidence: 99%
“…For the conversion, the parties need to obtain shares of a random permutation. As in [18] active security we only need to check that the comparator gates that are secret-shared by each party are either 0 or 1, which can be done using standard techniques [11]. Shares of inverse permutation.…”
Section: Conversion To Permutation Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…There has been a recent paradigm shift of designing MPC over rings, considering the fact that computer architectures use rings of size 32 or 64 bits. Designing and implementing MPC protocols over rings can leverage CPU optimizations and have been proven to have a significant impact on efficiency [21], [34], [37]- [39]. Furthermore, operating over rings avoids the need to overload basic operations such as addition and multiplication during implementation, or rely on an external library as compared to working over prime order fields.…”
Section: Introductionmentioning
confidence: 99%