基于可验证混淆电路的合作式安全两方计算协议  被引量:4

Efficient and Cooperative Secure Two-Party Computation Based on Authenticated Garbled Circuit

在线阅读下载全文

作  者:张宗洋 刘翔宇 李威翰 陈劳 ZHANG Zong-Yang;LIU Xiang-Yu;LI Wei-Han;CHEN Lao(School of Cyber Science and Technology,Beihang University,Beijing 100191)

机构地区:[1]北京航空航天大学网络空间安全学院,北京100191

出  处:《计算机学报》2022年第11期2433-2455,共23页Chinese Journal of Computers

基  金:国家重点研究计划项目(2021YFB3100400);国家自然科学基金项目(61972017,72031001,61972310);北京市自然科学基金(M22038,4202037);中央高校基本科研业务费(YWF-22-L-1039);云南省区块链应用技术重点实验室(培育)开放课题(YNB202101)资助

摘  要:本文针对基于混淆电路的安全两方计算协议通信复杂度过高的问题,研究如何进一步优化协议的性能.本文基于可验证混淆电路分享方案,在恶意敌手模型下实现了一种更高效的安全两方计算协议.主要创新性工作包括两个方面:(1)实现了一种新的可验证混淆电路分享方案.该方案延续了将混淆电路与秘密分享结合的思路,在Three-Halves混淆电路中结合可验证随机比特技术来生成混淆电路分享份额,保证了在恶意敌手模型下的安全性,与门运算的通信复杂度降低了约25%,而或门运算仍是零通信开销的;(2)提出了一个安全两方计算协议.设计了一种合作式协议流程设计方案,通过划分布尔电路的方式,由两个参与方各承担一半电路的混淆或分析工作,合作完成计算任务,分摊了安全两方计算协议中的计算压力.利用提出的可验证混淆电路分享方案,基于哈希函数等密码学工具,本协议保证了电路计算的正确性以及在恶意敌手模型下的安全性.与Emp-toolkit两方协议相比,本协议通信时延优化了1%~9%,计算时延优化了5%~22%,通信量优化了40%~60%.With the continuous improvement of informatization,new technologies,such as big data,artificial intelligence and blockchain,have been applied to all walks of life.These new technologies rely on data sharing across fields and enterprises.This way promotes the rapid development of industries such as finance,medical care,and commerce,but threatens the security of private data.How to achieve efficient data sharing and data interoperability while ensuring security is a problem to be solved in the current privacy protection field.Secure multi-party computation is one of high-level cryptography providing a new idea to ensure privacy.The secure two-party computation is the basis for constructing secure multi-party computation protocols.And it can also solve security problems of privacy data well in two-party applications,such as genome sequence alignment and pattern matching.Thus,secure two-party computation is one of the current research hotspots.The existing secure two-party computation protocols based on garbled circuit often have high communication complexity and poor performance in the malicious adversary model.This paper mainly studies how to optimize secure two-party computation protocols following the idea of Wang et al(CCS 2017).This paper implements a more efficient secure two-party computation protocol based on an authenticated garbling scheme under malicious adversary model.The main contributions are summarized as follows.(1) We implement a new authenticated garbling scheme.This scheme follows the idea of combining garbled circuit with secret sharing,which is proposed by Wang et al(CCS 2017).We combine the authenticated random bit sharing scheme with Three-Halves garbled circuit,and implement a new authenticated garbling scheme.This scheme reduces the communication complexity of AND gates operation by about 25%,while ensuring security against malicious adversaries.Meanwhile,XOR gates require no communication.(2) We propose a secure two-party computation protocol.We design a cooperative process scheme for the

关 键 词:混淆电路 秘密分享 掩码技术 布尔电路 安全两方计算 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象