CryptoDB
Chenkai Weng
Publications
Year
Venue
Title
2024
ASIACRYPT
Dishonest Majority Constant-Round MPC with Linear Communication from DDH
Abstract
In this work, we study constant round multiparty computation (MPC) for Boolean circuits against a fully malicious adversary who may control up to $n-1$ out of $n$ parties. Without relying on fully homomorphic encryption (FHE), the best-known results in this setting are achieved by Wang et al. (CCS 2017) and Hazay et al. (ASIACRYPT 2017) based on garbled circuits, which require a quadratic communication in the number of parties $O(|C|\cdot n^2)$. In contrast, for non-constant round MPC, the recent result by Rachuri and Scholl (CRYPTO 2022) has achieved linear communication $O(|C|\cdot n)$.
In this work, we present the first concretely efficient constant round MPC protocol in this setting with linear communication in the number of parties $O(|C|\cdot n)$. Our construction can be based on any public-key encryption scheme that is linearly homomorphic for public keys. Our work gives a concrete instantiation from a variant of the El-Gamal Encryption Scheme assuming the DDH assumption. The analysis shows that when the computational security parameter $\lambda=128$ and statistical security parameter $\kappa=80$, our protocol achieves a smaller communication than Wang et al. (CCS 2017) when there are $16$ parties for AES circuit, and $8$ parties for general Boolean circuits (where we assume that the numbers of AND gates and XOR gates are the same). When comparing with the recent work by Beck et al. (CCS 2023) that achieves constant communication complexity $O(|C|)$ in the strong honest majority setting ($t<(1/2-\epsilon)n$ where $\epsilon$ is a constant), our protocol is better as long as $n<3500$ (when $t=n/4$ for their work).
2024
JOFC
An Efficient ZK Compiler from SIMD Circuits to General Circuits
Abstract
<jats:title>Abstract</jats:title>
<jats:p>We propose a generic compiler that can convert any zero-knowledge (ZK) proof for SIMD circuits to general circuits efficiently, and an extension that can preserve the space complexity of the proof systems. Our compiler can immediately produce new results improving upon state of the art.<jats:list list-type="bullet">
<jats:list-item>
<jats:p>By plugging in our compiler to Antman, an interactive sublinear-communication protocol, we improve the overall communication complexity for general circuits from <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$\mathcal {O}(C^{3/4})$$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mo>(</mml:mo>
<mml:msup>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mn>3</mml:mn>
<mml:mo>/</mml:mo>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:math>
</jats:alternatives>
</jats:inline-formula> to <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$\mathcal {O}(C^{1/2})$$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mo>(</mml:mo>
<mml:msup>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>/</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:math>
</jats:alternatives>
</jats:inline-formula>. Our implementation shows that for a circuit of size <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$2^{27}$$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:msup>
<mml:mn>2</mml:mn>
<mml:mn>27</mml:mn>
</mml:msup>
</mml:math>
</jats:alternatives>
</jats:inline-formula>, it achieves up to <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$83.6\times $$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:mrow>
<mml:mn>83.6</mml:mn>
<mml:mo>×</mml:mo>
</mml:mrow>
</mml:math>
</jats:alternatives>
</jats:inline-formula> improvement on communication compared to the state-of-the-art implementation. Its end-to-end running time is at least <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$70\%$$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:mrow>
<mml:mn>70</mml:mn>
<mml:mo>%</mml:mo>
</mml:mrow>
</mml:math>
</jats:alternatives>
</jats:inline-formula> faster in a 10Mbps network.</jats:p>
</jats:list-item>
<jats:list-item>
<jats:p>Using the recent results on compressed <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$\varSigma $$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:mi>Σ</mml:mi>
</mml:math>
</jats:alternatives>
</jats:inline-formula>-protocol theory, we obtain a discrete-log-based constant-round zero-knowledge argument with <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$\mathcal {O}(C^{1/2})$$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mo>(</mml:mo>
<mml:msup>
<mml:mi>C</mml:mi>
<mml:mrow>
<mml:mn>1</mml:mn>
<mml:mo>/</mml:mo>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:math>
</jats:alternatives>
</jats:inline-formula> communication and common random string length, improving over the state of the art that has linear-size common random string and requires heavier computation.</jats:p>
</jats:list-item>
<jats:list-item>
<jats:p>We improve the communication of a designated <jats:italic>n</jats:italic>-verifier zero-knowledge proof from <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$\mathcal {O}(nC/B+n^2B^2)$$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mo>(</mml:mo>
<mml:mi>n</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>/</mml:mo>
<mml:mi>B</mml:mi>
<mml:mo>+</mml:mo>
<mml:msup>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:msup>
<mml:mi>B</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:math>
</jats:alternatives>
</jats:inline-formula> to <jats:inline-formula>
<jats:alternatives>
<jats:tex-math>$$\mathcal {O}(nC/B+n^2)$$</jats:tex-math>
<mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML">
<mml:mrow>
<mml:mi>O</mml:mi>
<mml:mo>(</mml:mo>
<mml:mi>n</mml:mi>
<mml:mi>C</mml:mi>
<mml:mo>/</mml:mo>
<mml:mi>B</mml:mi>
<mml:mo>+</mml:mo>
<mml:msup>
<mml:mi>n</mml:mi>
<mml:mn>2</mml:mn>
</mml:msup>
<mml:mo>)</mml:mo>
</mml:mrow>
</mml:math>
</jats:alternatives>
</jats:inline-formula>.</jats:p>
</jats:list-item>
</jats:list> To demonstrate the scalability of our compilers, we were able to extract a commit-and-prove SIMD ZK from Ligero and cast it in our framework. We also give one instantiation derived from LegoSNARK, demonstrating that the idea of CP-SNARK also fits in our methodology.</jats:p>
2023
EUROCRYPT
SuperPack: Dishonest Majority MPC with Constant Online Communication
Abstract
In this work we present a novel actively secure dishonest majority MPC protocol, \textsc{SuperPack}, whose efficiency improves as the number of \emph{honest} parties increases. Concretely, let $0<\epsilon<1/2$ and consider an adversary that corrupts $t<n(1-\epsilon)$ out of $n$ parties.
\textsc{SuperPack} requires $6/\epsilon$ field elements of online communication per multiplication gate across all parties, assuming circuit-dependent preprocessing, and $10/\epsilon$ assuming circuit-independent preprocessing.
In contrast, most of previous works such as SPDZ (Damg\aa rd \emph{et al}, ESORICS 2013) and its derivatives perform the same regardless of whether there is only one honest party, or a constant (non-majority) fraction of honest parties.
The only exception is due to Goyal \emph{et al} (CRYPTO 2022), which achieves $58/\epsilon + 96/\epsilon^2$ field elements assuming circuit-independent preprocessing.
Our work improves this result substantially by a factor of at least $25$ in the circuit-independent preprocessing model.
Practically, we also compare our work with the best concretely efficient online protocol Turbospeedz (Ben-Efraim \emph{et al}, ACNS 2019), which achieves $2(1-\epsilon)n$ field elements per multiplication gate among all parties. Our online protocol improves over Turbospeedz as $n$ grows, and as $\epsilon$ approaches $1/2$.
For example, if there are $90\%$ corruptions ($\epsilon=0.1$), with $n=50$ our online protocol is $1.5\times$ better than Turbospeedz and with $n=100$ this factor is $3\times$, but for $70\%$ corruptions ($\epsilon=0.3$) with $n=50$ our online protocol is $3.5\times$ better, and for $n=100$ this factor is $7\times$.
Our circuit-dependent preprocessing can be instantiated from OLE/VOLE. The amount of OLE/VOLE correlations required in our work is a factor of $\approx \epsilon n/2$ smaller than these required by Le Mans (Rachuri and Scholl, CRYPTO 2022) leveraged to instantiate the proprocesing of Turbospeedz.
Our dishonest majority protocol relies on packed secret-sharing and leverages ideas from the honest majority \textsc{TurboPack} (Escudero \emph{et al}, CCS 2022) protocol to achieve concrete efficiency for any circuit topology, not only SIMD.
We implement both \textsc{SuperPack} and Turbospeedz and verify with experimental results that our approach indeed leads to more competitive runtimes in distributed environments with a moderately large number of parties.
2020
CRYPTO
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
📺
Abstract
We study the concrete security of high-performance implementations of half-gates garbling, which all rely on (hardware-accelerated) AES. We find that current instantiations using k-bit wire labels can be completely broken—in the sense that the circuit evaluator learns all the inputs of the circuit garbler—in time O(2k/C), where C is the total number of (non-free) gates that are garbled, possibly across multiple independent executions. The attack can be applied to existing circuit-garbling libraries using k = 80 when C ≈ $10^9$, and would require 267 machine-months and cost about $3500 to implement on the Google Cloud Platform. Since the attack can be entirely parallelized, the attack could be carried out in about a month using ≈ 250 machines.
With this as our motivation, we seek a way to instantiate the hash function in the half-gates scheme so as to achieve better concrete security. We present a construction based on AES that achieves optimal security in the single-instance setting (when only a single circuit is garbled). We also show how to modify the half-gates scheme so that its concrete security does not degrade in the multi-instance setting. Our modified scheme is as efficient as prior work in networks with up to 2 Gbps bandwidth.
Coauthors
- Dung Bui (1)
- Haotian Chu (1)
- Geoffroy Couteau (1)
- Daniel Escudero (1)
- Vipul Goyal (2)
- Chun Guo (1)
- Jonathan Katz (1)
- Junru Li (1)
- Ankit Kumar Misra (1)
- Rafail Ostrovsky (1)
- Antigoni Polychroniadou (1)
- Yifan Song (2)
- Xiao Wang (2)
- Chenkai Weng (4)
- Kang Yang (1)
- Yu Yu (2)