Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23097
|View full text |Cite
|
Sign up to set email alerts
|

Pushing the Communication Barrier in Secure Computation using Lookup Tables

Abstract: Secure two-party computation has witnessed significant efficiency improvements in the recent years. Current implementations of protocols with security against passive adversaries generate and process data much faster than it can be sent over the network, even with a single thread. This paper introduces novel methods to further reduce the communication bottleneck and round complexity of semi-honest secure two-party computation. Our new methodology creates a trade-off between communication and computation, and w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
73
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3
2

Relationship

3
7

Authors

Journals

citations
Cited by 47 publications
(74 citation statements)
references
References 30 publications
1
73
0
Order By: Relevance
“…We instantiated the PRP of the server-aided PSI protocol in Kamara et al (2014) and the CRF in the ( 2 1 )-OT extension with fixed-key AES-128, and instantiated the RO and the CRF in the ( N 1 )-OT extension with SHA-256. We instantiated the CRF in the ( N 1 )-OT using SHA-256 instead of AES, since it needs to process inputs of 512 bit-length and AES only allows to process inputs with 128 bit when using fixed-key AES-128 or 256 bit when using the key schedule of AES-256 (Dessouky et al 2017). We implemented FFC (finite field cryptography) using the GMP library (v. 5.1.2), ECC using the Miracl library (v. 5.6.1), symmetric cryptographic primitives using OpenSSL (v. 1.0.1e), and used the OT extension implementation of Asharov et al (2013).…”
mentioning
confidence: 99%
“…We instantiated the PRP of the server-aided PSI protocol in Kamara et al (2014) and the CRF in the ( 2 1 )-OT extension with fixed-key AES-128, and instantiated the RO and the CRF in the ( N 1 )-OT extension with SHA-256. We instantiated the CRF in the ( N 1 )-OT using SHA-256 instead of AES, since it needs to process inputs of 512 bit-length and AES only allows to process inputs with 128 bit when using fixed-key AES-128 or 256 bit when using the key schedule of AES-256 (Dessouky et al 2017). We implemented FFC (finite field cryptography) using the GMP library (v. 5.1.2), ECC using the Miracl library (v. 5.6.1), symmetric cryptographic primitives using OpenSSL (v. 1.0.1e), and used the OT extension implementation of Asharov et al (2013).…”
mentioning
confidence: 99%
“…3.2). More concretely, we have the protocols like table lookup [42], [50], the maximum/minimum value extraction [42], sorting [51]- [56], database join [57], [58], and floating point number computation [59]- [61] 3…”
Section: (5) Other Protocolsmentioning
confidence: 99%
“…While a XOR gate can be evaluated locally, an AND gate requires 2κ bits of communication in the setup phase and 4 bits in the online phase, as described in [59]. The communication of GMW can be further reduced at the cost of a higher computation complexity [62,63].…”
Section: B Secure Multi-party Computationmentioning
confidence: 99%