×

Implementing AES via an actively/covertly secure dishonest-majority MPC protocol. (English) Zbl 1365.68239

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 241-263 (2012).
Summary: We describe an implementation of the protocol of the first author et al. [Lect. Notes Comput. Sci. 7417, 643–662 (2012; Zbl 1296.94104)] (SPDZ/Speedz) for multi-party computation in the presence of a dishonest majority of active adversaries. We present a number of modifications to the protocol; the first reduces the security to covert security, but produces significant performance enhancements; the second enables us to perform bit-wise operations in characteristic two fields. As a bench mark application we present the evaluation of the AES cipher, a now standard bench marking example for multi-party computation. We need examine two different implementation techniques, which are distinct from prior MPC work in this area due to the use of MACs within the SPDZ protocol. We then examine two implementation choices for the finite fields; one based on finite fields of size \(2^{8}\) and one based on embedding the AES field into a larger finite field of size \(2^{40}\).
For the entire collection see [Zbl 1246.68059].

MSC:

68P25 Data encryption (aspects in computer science)
68M12 Network protocols
68Q05 Models of computation (Turing machines, etc.) (MSC2010)
68Q10 Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.)
94A60 Cryptography

Citations:

Zbl 1296.94104

Software:

TASTY
Full Text: DOI