Sciweavers

Share
CANS
2015
Springer

Outsourcing Secure Two-Party Computation as a Black Box

2 years 11 months ago
Outsourcing Secure Two-Party Computation as a Black Box
Secure multiparty computation (SMC) offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic construction feasible on mobile devices securely outsource the bulk of the computation to a cloud provider. However, these outsourcing techniques are built on specific secure computation assumptions and tools, and applying new SMC ideas to the outsourced setting requires the protocols to be completely rebuilt and proven secure. In this work, we develop a generic technique for lifting any secure two-party computation protocol into an outsourced two-party SMC protocol. By augmenting the function being evaluated with auxiliary consistency checks and input values, we can create an outsourced protocol with low overhead cost. Our implementation and evaluation show that in the best case, our outsourcing additions execute within the confidence intervals of two servers running the same computation, and consume approxim...
Henry Carter, Benjamin Mood, Patrick Traynor, Kevi
Added 17 Apr 2016
Updated 17 Apr 2016
Type Journal
Year 2015
Where CANS
Authors Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
Comments (0)
books