Many implementations of secure computation use fixed-key AES (modeled as a random permutation); this results in substantial performance benefits due to existing hardware support for AES and the ability to avoid recomputing the AES key schedule. Surveying these implementations, however, we find that most utilize AES in a heuristic fashion; in the best case this leaves a gap in the security proof, but in many cases we show it allows for explicit attacks.Motivated by this unsatisfactory state of affairs, we initiate a comprehensive study of how to use fixed-key block ciphers for secure computation - in particular for OT extension and circuit garbling - efficiently and securely. Specifically:•We consider several notions of pseudorandomness for hash functions (e.g., correlation robustness), and show provably secure schemes for OT extension, garbling, and other applications based on hash functions satisfying these notions.•We provide provably secure constructions, in the (non-programmable) random-permutation model, of hash functions satisfying the different notions of pseudorandomness we consider.Taken together, our results provide end-to-end security proofs for implementations of secure-computation protocols based on fixed-key block ciphers (modeled as random permutations). Perhaps surprisingly, at the same time our work also results in noticeable performance improvements over the state-of-the-art.
CITATION STYLE
Guo, C., Katz, J., Wang, X., & Yu, Y. (2020). Efficient and secure multiparty computation from fixed-key block ciphers. In Proceedings - IEEE Symposium on Security and Privacy (Vol. 2020-May, pp. 825–841). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1109/SP40000.2020.00016
Mendeley helps you to discover research relevant for your work.