Compiling Passive SMC to Malicious: Beyond Arithmetic Circuits

Guardat en:
Dades bibliogràfiques
Publicat a:ProQuest Dissertations and Theses (2025)
Autor principal: Murphy, Dennis
Publicat:
ProQuest Dissertations & Theses
Matèries:
Accés en línia:Citation/Abstract
Full Text - PDF
Etiquetes: Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!

MARC

LEADER 00000nab a2200000uu 4500
001 3250286871
003 UK-CbPIL
020 |a 9798293834037 
035 |a 3250286871 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Murphy, Dennis 
245 1 |a Compiling Passive SMC to Malicious: Beyond Arithmetic Circuits 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a This work studies compilation of honest-majority multi-party protocols secure against semi-honest adversaries and up to additive attacks, into maliciously secure computation with abort. Prior work concentrated on arithmetic circuits composed of addition and multiplication gates, while many practical protocols rely on additional types of elementary operations or gates to achieve good performance. In this work we revisit the notion of security up to additive attacks in the presence of additional gates such as random element generation and opening. This requires re-evaluation of functions that can be securely evaluated, extending the notion of protocols secure up to additive attacks. We also revisit the notion of delayed verification which points to weaknesses in its prior use and design a mitigation strategy. We transform the computation using dual execution to achieve security in the malicious model with abort and experimentally evaluate the difference in performance of semi-honest and malicious protocols to demonstrate the low cost. We first treat computation over finite fields, which has the benefit that every nonzero element is invertible, but the drawback that frequent modular reduction by values which are not powers of two is relatively expensive. We then proceed to consider computation over rings of characteristic power of two. In this setting, the above trade-off is reversed; most modular reductions are significantly more efficient, while ring elements are not guaranteed to be invertible. In both cases we seek to augment the standard linear arithmetic functionalities of addition and multiplication with gates which allow for nonlinear computation such as comparison and truncation. 
653 |a Computer science 
653 |a Engineering 
653 |a Communication 
653 |a Information technology 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3250286871/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3250286871/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch