Using Tiny Trusted Third Parties to Enhance Secure Two Party Computations

نویسندگان

  • Alexander Iliev
  • Sean Smith
چکیده

Secure Multiparty Computation (SMC), in its many forms, has received theoretical attention for more than two decades, yielding many protocols for many settings. One common thread is that the protocols cannot in actuality use a Trusted Third Party (TTP), even though this is conceptually the simplest and most general way to solve SMC problems. Thus, current protocols involve only the direct players (who do not trust each other), and incur a cost which is sometimes considerable. Recent work in practical security has seen the development of devices intended to be used as actually trustworthy third parties, namely the secure coprocessor (SCop), like the IBM 4758. This opens the door for a different approach to SMC problems, utilizing these new TTPs. One major challenge is executing large programs on large inputs using a TTP with very limited protected memory (which can be adequately shielded), and a slow processor, while preserving the trust properties that an ideal TTP provides. We propose to investigate the use of real TTPs to help with the solution of SMC problems. We would like to investigate in particular the balance between solutions which do not use a TTP (and so have access to fast processing with large memory) and those which do (and so avoid some of the algorithmic overheads of the other solutions). We have already investigated the use of such TTPs to solve the Private Information Retrieval (PIR) problem, which is one important instance of SMC. The rest of the thesis will be targeted at general SMC, which is currently solved by blinding a boolean circuit which computes the desired function. This approach has several sources of overhead, some due to the circuit representation and some due to the blinding. We propose to investigate how moving some functionality into a SCop TTP, and thus avoiding the blinded circuit overhead, can improve the performance of existing SMC solutions. Recently a prototype system for general secure two-party computation, Fairplay, has been developed, which we can use as a starting point and also as a point of reference for performance analysis. Since limited memory size appears to be a salient feature of highly trustworthy devices (and certainly a feature of current high-end devices), we are basing all our designs on the assumption that the protected memory is tiny. This should allow less expensive devices to be used. We have outlined how a new-generation tiny TTP can be optimized for a common class of bottleneck algorithms used in TTP-assisted SMC applications. We expect a speed improvement of several orders of magnitude over the 4758, in a very small device. We will next build an initial FPGA prototype of such a tiny TTP, and report on its performance and size. ∗Advised by Sean Smith

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties

We investigate the use of trustworthy devices, which function as trusted third parties (TTPs), to solve general two-party Secure Function Evaluation (SFE) problems. We assume that a really trustworthy TTP device will have very limited protected memory and computation environment—a tiny TTP. This precludes trivial solutions like "just run the function in the TTP". Traditional scrambled circuit e...

متن کامل

A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining

Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate com...

متن کامل

Efficient Secure Computation with Garbled Circuits

Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, we show the potential of building privacy-preserving applications using garbled circuits, a generic technique that until recently was believed to be too inefficient to s...

متن کامل

Bit Commitment, Oblivious Transfer, and Mental Poker without One-way Functions

While it is fairly obvious that a secure (bit) commitment between two parties is impossible without a one-way function, we show that it is possible if the number of parties is at least 3. Then we show how our unconditionally secure (bit) commitment scheme for 3 parties can be used to arrange an unconditionally secure (bit) commitment between just two parties if they use a “dummy” (e.g., a compu...

متن کامل

Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation

Secure sum computation of private data inputs is an important component of Secure Multi-party Computation (SMC).In this paper we provide a protocol to compute the sum of individual data inputs with zero probability of data leakage. In our proposed protocol we break input of each party into number of segments and change the arrangement of the parties such that in each round of the computation th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006