log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
PhD Defense: A New Paradigm For Practical Maliciously Secure Multi-party Computation
Xiao Wang
Wednesday, June 13, 2018, 2:30-4:30 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

Secure Multi-Party Computation (MPC) protocols allow a group of mutually distrusting users to compute a function jointly on their inputs without revealing any information beyond the output. For many years, implementations of MPC protocols have targeted on a security model against semi-honest adversaries, i.e., attackers are assumed to execute the protocol honestly but try to learn private information after the fact. Protocols secure against stronger and more realistic malicious adversaries, who could behave arbitrarily during the protocol execution, were known to exist but were much less efficient. This thesis introduces a new paradigm to construct extremely efficient MPC protocols with malicious security. In particular, this thesis consists of three major contributions. 
 

  1. We introduce the authenticated garbling framework, and present an efficient concrete instantiation of the protocol. The resulting protocol partially closes the gap between semi-honest and malicious MPC protocols asymptotically; the implementation of the protocol represents the state-of-the-art system for malicious two-party computation.
  2. We discuss how to apply authenticated garbling idea to the multi-party setting, where all- but-one parties can be corrupted by the adversary. The resulting protocol improves upon the best previous constant-round protocol by orders of magnitude. We also present a system that, for the first time, enables MPC executions among hundreds of parties, distributed globally.
  3. We present a series of optimizations to the two-party authenticated garbling by interpreting authenticated garbling in a new way. The improved malicious protocol has essentially the same concrete efficiency as the best semi-honest protocol in the preprocessing model.
Examining Committee: 
 
                          Chair:               Dr. Jonathan Katz
                          Dean's rep:      Dr. Nikhil Chopra
                          Members:        Dr. Dana Dachman-Soled
                                                    Dr. Michael Hicks
                                                    Dr. Vladimir Kolesnikov
                                                  
This talk is organized by Tom Hurst