Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3460120.3485375acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

MPC-Friendly Commitments for Publicly Verifiable Covert Security

Published: 13 November 2021 Publication History

Abstract

We address the problem of efficiently verifying a commitment in a two-party computation. This addresses the scenario where a party P1 commits to a value x to be used in a subsequent secure computation with another party P2 that wants to receive assurance that P1 did not cheat, i.e. that x was indeed the value inputted into the secure computation. Our constructions operate in the publicly verifiable covert (PVC) security model, which is a relaxation of the malicious model of MPC, appropriate in settings where P1 faces a reputational harm if caught cheating.
We introduce the notion of PVC commitment scheme and indexed hash functions to build commitment schemes tailored to the PVC framework, and propose constructions for both arithmetic and Boolean circuits that result in very efficient circuits. From a practical standpoint, our constructions for Boolean circuits are 60x faster to evaluate securely, and use 36x less communication than baseline methods based on hashing. Moreover, we show that our constructions are tight in terms of required non-linear operations, by proving lower bounds on the nonlinear gate count of commitment verification circuits. Finally, we present a technique to amplify the security properties our constructions that allows to efficiently recover malicious guarantees with statistical security.

Supplementary Material

MP4 File (CCS21-fp419_short.mp4)
Short version

References

[1]
Nitin Agrawal, Ali Shahin Shamsabadi, Matt J Kusner, and Adrià Gascón. 2019. QUOTIENT: two-party secure neural network training and prediction. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 1231--1247.
[2]
Martin Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, and Tyge Tiessen. 2016. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 191--219.
[3]
Martin R Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, and Michael Zohner. 2015. Ciphers for MPC and FHE. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 430--454.
[4]
Dario Amodei, Chris Olah, Jacob Steinhardt, Paul Christiano, John Schulman, and Dan Mané. 2016. Concrete problems in AI safety. arXiv preprint arXiv:1606.06565 (2016).
[5]
David Archer, Victor Arribas Abril, Steve Lu, Pieter Maene, Nele Mertens, Danilo Sijacic, and Nigel Smart. 2018. 'Bristol Fashion' MPC Circuits. https://homes.esat.kuleuven.be/ nsmart/MPC/.
[6]
Gilad Asharov, Yehuda Lindell, Thomas Schneider, and Michael Zohner. 2013. More efficient oblivious transfer and extensions for faster secure computation. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 535--548.
[7]
Gilad Asharov and Claudio Orlandi. 2012. Calling Out Cheaters: Covert Security with Public Verifiability. In ASIACRYPT (Lecture Notes in Computer Science, Vol. 7658). Springer, 681--698.
[8]
Yonatan Aumann and Yehuda Lindell. 2010. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. J. Cryptology, Vol. 23, 2 (2010), 281--343.
[9]
Carsten Baum. 2016. On garbling schemes with and without privacy. In International Conference on Security and Cryptography for Networks. Springer, 468--485.
[10]
Aner Ben-Efraim, Yehuda Lindell, and Eran Omri. 2017. Efficient scalable constant-round MPC via garbled circuits. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 471--498.
[11]
Guido Bertoni, Joan Daemen, Michael Peeters, and Gilles Van Assche. 2008. On the indifferentiability of the sponge construction. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 181--197.
[12]
Mariusz Bojarski, Philip Yeres, Anna Choromanska, Krzysztof Choromanski, Bernhard Firner, Lawrence Jackel, and Urs Muller. 2017. Explaining how a deep neural network trained with end-to-end learning steers a car. arXiv preprint arXiv:1704.07911 (2017).
[13]
Ran Canetti and Marc Fischlin. 2001. Universally Composable Commitments. In Advances in Cryptology -- CRYPTO 2001, Joe Kilian (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 19--40.
[14]
L Elisa Celis, Lingxiao Huang, Vijay Keswani, and Nisheeth K Vishnoi. 2019. Classification with fairness constraints: A meta-algorithm with provable guarantees. In Proceedings of the Conference on Fairness, Accountability, and Transparency. 319--328.
[15]
Ivan Damgård, Martin Geisler, and Jesper Buus Nielsen. 2010. From Passive to Covert Security at Low Cost. In TCC (Lecture Notes in Computer Science, Vol. 5978). Springer, 128--145.
[16]
Thomas Davenport and Ravi Kalakota. 2019. The potential for artificial intelligence in healthcare. Future healthcare journal, Vol. 6, 2 (2019), 94.
[17]
Itai Dinur, Yunwen Liu, Willi Meier, and Qingju Wang. 2015. Optimized interpolation attacks on LowMC. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 535--560.
[18]
Tore K Frederiksen, Benny Pinkas, and Avishay Yanai. 2018. Committed MPC. In IACR International Workshop on Public Key Cryptography. Springer, 587--619.
[19]
Adrià Gascón, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, and David Evans. 2017. Privacy-preserving distributed linear regression on high-dimensional data. Proceedings on Privacy Enhancing Technologies, Vol. 2017, 4 (2017), 345--364. https://doi.org/10.1515/popets-2017-0053
[20]
Zahra Ghodsi, Tianyu Gu, and Siddharth Garg. 2017. Safetynets: Verifiable execution of deep neural networks on an untrusted cloud. In Advances in Neural Information Processing Systems. 4672--4681.
[21]
Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin E. Lauter, Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. In ICML (JMLR Workshop and Conference Proceedings, Vol. 48). JMLR.org, 201--210.
[22]
Vipul Goyal, Payman Mohassel, and Adam D. Smith. 2008. Efficient Two Party and Multi Party Computation Against Covert Adversaries. In EUROCRYPT (Lecture Notes in Computer Science, Vol. 4965). Springer, 289--306.
[23]
Zecheng He, Tianwei Zhang, and Ruby B Lee. 2018. VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting. arXiv preprint arXiv:1808.03277 (2018).
[24]
Cheng Hong, Jonathan Katz, Vladimir Kolesnikov, Wen-jie Lu, and Xiao Wang. 2019. Covert Security with Public Verifiability: Faster, Leaner, and Simpler. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 97--121.
[25]
Yuval Ishai, Eyal Kushilevitz, and Rafail Ostrovsky. 2005. Sufficient Conditions for Collision-Resistant Hashing. In Theory of Cryptography, Joe Kilian (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 445--456.
[26]
Cheng Hong Jonathan Katz Vladimir Kolesnikov Wen jie Lu Xiao Wang. 2019. Covert Security with Public Verifiability: Faster, Leaner, and Simpler. In EuroCrypt .
[27]
Jonathan Katz, Alex J Malozemoff, and Xiao Wang. [n.,d.]. Efficiently Enforcing Input Validity in Secure Two-party Computation. ( [n.,d.]).
[28]
Niki Kilbertus, Adria Gascon, Matt Kusner, Michael Veale, Krishna P Gummadi, and Adrian Weller. 2018. Blind Justice: Fairness with Encrypted Sensitive Attributes. In International Conference on Machine Learning. 2635--2644.
[29]
Yehuda Lindell. 2013. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries. In CRYPTO (2) (Lecture Notes in Computer Science, Vol. 8043). Springer, 1--17.
[30]
Yehuda Lindell. 2020. Secure Multiparty Computation (MPC). IACR Cryptol. ePrint Arch., Vol. 2020 (2020), 300.
[31]
Zachary C Lipton. 2018. The Mythos of Model Interpretability: In machine learning, the concept of interpretability is both important and slippery. Queue, Vol. 16, 3 (2018), 31--57.
[32]
David Madras, Elliot Creager, Toniann Pitassi, and Richard Zemel. 2018. Learning adversarially fair and transferable representations. arXiv preprint arXiv:1802.06309 (2018).
[33]
Payman Mohassel and Peter Rindal. 2018. ABY 3: a mixed protocol framework for machine learning. In Proceedings of the 2018 ACM Conference on Computer and Communications Security. ACM, 35--52.
[34]
Payman Mohassel and Yupeng Zhang. 2017. SecureML: A system for scalable privacy-preserving machine learning. In 2017 38th IEEE Symposium on Security and Privacy. IEEE, 19--38.
[35]
Sina Mohseni, Mandar Pitale, Vasu Singh, and Zhangyang Wang. 2019. Practical solutions for machine learning safety in autonomous vehicles. arXiv preprint arXiv:1912.09630 (2019).
[36]
Moni Naor, Benny Pinkas, and Benny Pinkas. 2001. Efficient oblivious transfer protocols. In Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms. Society for Industrial and Applied Mathematics, 448--457.
[37]
Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, and Nina Taft. 2013. Privacy-preserving ridge regression on hundreds of millions of records. In 2013 IEEE Symposium on Security and Privacy. IEEE, 334--348.
[38]
Ziad Obermeyer, Brian Powers, Christine Vogeli, and Sendhil Mullainathan. 2019. Dissecting racial bias in an algorithm used to manage the health of populations. Science, Vol. 366, 6464 (2019), 447--453.
[39]
Krzysztof Pietrzak. 2012. Cryptography from Learning Parity with Noise. 99--114. https://doi.org/10.1007/978--3--642--27660--6_9
[40]
RE Putra, AI Nurhidayat, and AY Wicaksono. 2018. Implementation of Neural Network to determine the New College Students. In IOP Conference Series: Materials Science and Engineering, Vol. 288. IOP Publishing, 012121.
[41]
Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. 2016. "Why should i trust you?" Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining. 1135--1144.
[42]
O.S Rothaus. 1976. On "bent" functions. Journal of Combinatorial Theory, Series A, Vol. 20, 3 (1976), 300--305. https://doi.org/10.1016/0097--3165(76)90024--8
[43]
Amartya Sanyal, Matt J. Kusner, Adrià Gascó n, and Varun Kanade. 2018. TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service. In International Conference on Machine Learning. 4497--4506.
[44]
Shahar Segal, Yossi Adi, Benny Pinkas, Carsten Baum, Chaya Ganesh, and Joseph Keshet. 2020. Fairness in the Eyes of the Data: Certifying Machine-Learning Models. arXiv preprint arXiv:2009.01534 (2020).
[45]
Sameer Wagh, Divya Gupta, and Nishanth Chandran. 2019. SecureNN: 3-Party Secure Computation for Neural Network Training. Proceedings on Privacy Enhancing Technologies, Vol. 1 (2019), 24.
[46]
Xiao Wang, Alex J. Malozemoff, and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https://github.com/emp-toolkit .
[47]
Xiao Wang, Samuel Ranellucci, and Jonathan Katz. 2017a. Authenticated garbling and efficient maliciously secure two-party computation. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 21--37.
[48]
Xiao Wang, Samuel Ranellucci, and Jonathan Katz. 2017b. Global-scale secure multiparty computation. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 39--56.
[49]
Brian Hu Zhang, Blake Lemoine, and Margaret Mitchell. 2018. Mitigating unwanted biases with adversarial learning. In Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society. ACM, 335--340.

Cited By

View all
  • (2023)Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low OverheadAdvances in Cryptology – ASIACRYPT 202310.1007/978-981-99-8721-4_9(272-301)Online publication date: 4-Dec-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
November 2021
3558 pages
ISBN:9781450384544
DOI:10.1145/3460120
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2021

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. committed MPC
  2. privacy-preserving deep learning

Qualifiers

  • Research-article

Funding Sources

  • UK Government?s Defence & Security Programme
  • Callsign

Conference

CCS '21
Sponsor:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
November 15 - 19, 2021
Virtual Event, Republic of Korea

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)49
  • Downloads (Last 6 weeks)2
Reflects downloads up to 11 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low OverheadAdvances in Cryptology – ASIACRYPT 202310.1007/978-981-99-8721-4_9(272-301)Online publication date: 4-Dec-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media