POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries

被引:1
|
作者
Zhu, Ruiyu [1 ]
Huang, Yan [1 ]
Cassel, Darion [2 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
基金
美国国家科学基金会;
关键词
scalable actively-secure computation;
D O I
10.1145/3133956.3134070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the problem of running a long-term on-demand service for executing actively-secure computations. We examined state-of-the-art tools and implementations for actively-secure computation and identified a set of key features indispensable to offer meaningful service like this. Since no satisfactory tools exist for the purpose, we developed Pool, a new tool for building and executing actively-secure computation protocols at extreme scales with nearly zero offline delay. With Pool, we are able to obliviously execute, for the first time, reactive computations like ORAM in the malicious threat model. Many technical benefits of Pool can be attributed to the concept of pool-based cut-and-choose. We show with experiments that this idea has significantly improved the scalability and usability of JIMU [38], a state-of-the-art LEGO protocol.
引用
收藏
页码:245 / 257
页数:13
相关论文
共 39 条
  • [1] Secure linear system computation in the presence of malicious adversaries
    ZHANG Bo
    ZHANG FangGuo
    Science China(Information Sciences), 2014, 57 (09) : 146 - 155
  • [2] Secure linear system computation in the presence of malicious adversaries
    Zhang Bo
    Zhang FangGuo
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 10
  • [3] Two-Output Secure Computation with Malicious Adversaries
    Shelat, Abhi
    Shen, Chih-Hao
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 386 - 405
  • [4] Secure linear system computation in the presence of malicious adversaries
    Bo Zhang
    FangGuo Zhang
    Science China Information Sciences, 2014, 57 : 1 - 10
  • [5] Scalable, On-Demand Secure Multiparty Computation for Privacy-Aware Blockchains
    Sharma, Shantanu
    Ng, Wee Keong
    BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 196 - 211
  • [6] A Secure Scalar Product Protocol Against Malicious Adversaries
    Bo Yang
    Yong Yu
    Chung-Huang Yang
    Journal of Computer Science and Technology, 2013, 28 : 152 - 158
  • [7] A Secure Scalar Product Protocol Against Malicious Adversaries
    杨波
    禹勇
    杨中皇
    Journal of Computer Science & Technology, 2013, 28 (01) : 152 - 158
  • [8] A Secure Scalar Product Protocol Against Malicious Adversaries
    Yang, Bo
    Yu, Yong
    Yang, Chung-Huang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2013, 28 (01) : 152 - 158
  • [9] Secure blockchain bidding auction protocol against malicious adversaries
    Dai, Xiaobing
    Liu, Jiajing
    Liu, Xin
    Tu, Xiaofen
    Wang, Ruexue
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):
  • [10] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    JOURNAL OF CRYPTOLOGY, 2015, 28 (02) : 312 - 350