Circuits resilient to additive attacks with applications to secure computation

88Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We study the question of protecting arithmetic circuits against additive attacks, which can add an arbitrary fixed value to each wire in the circuit. This extends the notion of algebraic manipulation detection (AMD) codes, which protect information against additive attacks, to that of AMD circuits which protect computation. We present a construction of such AMD circuits: any arithmetic circuit C over a finite field F can be converted into a functionally-equivalent randomized arithmetic circuit Ĉ of size O(|C|) that is fault-tolerant in the following sense. For any additive attack on the wires of Ĉ its effect on the output of Ĉ can be simulated, up to O(|C|/|F|) statistical distance, by an additive attack on just the input and output. Given a small tamper-proof encoder/decoder for AMD codes, the input and output can be protected as well. We also give an alternative construction, applicable to small fields (for example, to protect Boolean circuits against wire-toggling attacks). It uses a small tamper-proof decoder to ensure that, except with negligible failure probability, either the output is correct or tampering is detected. Our study of AMD circuits is motivated by simplifying and improving protocols for secure multiparty computation (MPC). Typically, securing MPC protocols against active adversaries is much more difficult than securing them against passive adversaries. We observe that in simple passive-secure MPC protocols for circuit evaluation, the effect of any active adversary corresponds precisely to an additive attack on the original circuit's wires. Thus, to securely evaluate a circuit C in the presence of active adversaries, it suffices to apply the passive-secure protocol to Ĉ. We use this methodology to simplify feasibility results and attain efficiency improvements in several standard MPC models © 2014 ACM.

References Powered by Scopus

HOW TO GENERATE AND EXCHANGE SECRETS.

3249Citations
415Readers
Get full text
2081Citations
286Readers
Get full text

Multiparty unconditionally secure protocols

1266Citations
45Readers
Get full text

Cited by Powered by Scopus

Function secret sharing: Improvements and extensions

250Citations
122Readers
Get full text

Fast large-scale honest-majority MPC for malicious adversaries

93Citations
45Readers

This article is free to access.

Improved primitives for mpc over mixed arithmetic-binary circuits

79Citations
45Readers

This article is free to access.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Genkin, D., Ishai, Y., Prabhakaran, M. M., Sahai, A., & Tromer, E. (2014). Circuits resilient to additive attacks with applications to secure computation. In Proceedings of the Annual ACM Symposium on Theory of Computing (pp. 495–504). Association for Computing Machinery. https://doi.org/10.1145/2591796.2591861

Readers over time

‘15‘16‘17‘18‘19‘20‘21‘23036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 17

71%

Professor / Associate Prof. 3

13%

Researcher 3

13%

Lecturer / Post doc 1

4%

Readers' Discipline

Tooltip

Computer Science 23

82%

Physics and Astronomy 2

7%

Engineering 2

7%

Mathematics 1

4%

Save time finding and organizing research with Mendeley

Sign up for free
0