Multiparty Homomorphic Encryption from Ring-Learning-With-Errors

Multiparty Homomorphic Encryption from Ring-Learning-With-Errors

Proceedings on Privacy Enhancing Technologies ; 2021 (4):291–311 Christian Mouchet, Juan Troncoso-Pastoriza, Jean-Philippe Bossuat, and Jean-Pierre Hubaux Multiparty Homomorphic Encryption from Ring-Learning-with-Errors Abstract: We propose and evaluate a secure- 1 Introduction multiparty-computation (MPC) solution in the semi- honest model with dishonest majority that is based on Secure Multiparty Computation (MPC) protocols enable multiparty homomorphic encryption (MHE). To sup- a group of parties to securely compute joint functions port our solution, we introduce a multiparty version over their private inputs while enforcing specific secu- of the Brakerski-Fan-Vercauteren homomorphic cryp- rity guarantees throughout the computation. The exact tosystem and implement it in an open-source library. definition of security depends on how the adversary is MHE-based MPC solutions have several advantages: modeled, but the most common requirement, input pri- Their transcript is public, their offline phase is com- vacy, informally states that parties should not obtain pact, and their circuit-evaluation procedure is non- more information about other parties’ inputs than that interactive. By exploiting these properties, the com- which can be deduced from the output of the compu- munication complexity of MPC tasks is reduced from tation. Combining this strong security guarantee with quadratic to linear in the number of parties, thus a general functionality makes the study of MPC tech- enabling secure computation among potentially thou- niques highly relevant. This last decade has seen this sands of parties and in a broad variety of comput- established theoretical field evolve into an applied one, ing paradigms, from the traditional peer-to-peer set- notably due to its potential for securing data-sharing ting to cloud-outsourcing and smart-contract technolo- scenarios in the financial [12, 13], biomedical [37, 49] and gies. MHE-based approaches can also outperform the law-enforcement [10, 41] sectors, as well as for protect- state-of-the-art solutions, even for a small number of ing digital assets [5]. The use of passively-secure MPC parties. We demonstrate this for three circuits: private techniques in such scenarios has been demonstrated to input selection with application to private-information be effective and practical [4, 21, 37], notably in the med- retrieval, component-wise vector multiplication with ap- ical sector where data collaborations are mutually ben- plication to private-set intersection, and Beaver mul- eficial and well-regulated, yet they legally require a cer- tiplication triples generation. For the first circuit, pri- tain level of data-protection [21, 49]. vately selecting one input among eight thousand parties’ In the settings where no honest majority of parties (of 32 KB each) requires only 1.31 MB of communica- can be guaranteed, most of the currently implemented tion per party and completes in 61.7 seconds. For the MPC systems are based on secret-sharing [53] of the in- second circuit with eight parties, our approach is 8.6 put data according to some linear secret-sharing scheme times faster and requires 39.3 times less communication (LSSS), and on interactive circuit evaluation protocols than the current methods. For the third circuit and ten [36]. These approaches have two practical limitations: (i) parties, our approach generates 20 times more triples standard protocols require many rounds of communica- per second while requiring 136 times less communication tion over private channels between the parties, which per-triple than an approach based on oblivious transfer. makes them inadequate for low-end devices and unre- We implemented our scheme in the Lattigo library and liable networks. (ii) current approaches require a per- open-sourced the code at github.com/ldsec/lattigo. party communication that increases linearly in the cir- Keywords: secure multiparty computation, homomor- cuit size (that increases at least linearly in the number phic encryption DOI 10.2478/popets-2021-0071 Received 2021-02-28; revised 2021-06-15; accepted 2021-06-16. Juan Troncoso-Pastoriza: École polytechnique fédérale de Lausanne, E-mail: juan.troncoso-pastoriza@epfl.ch Jean-Philippe Bossuat: École polytechnique fédérale de Lausanne, E-mail: jean-philippe.bossuat@epfl.ch Jean-Pierre Hubaux: École polytechnique fédérale de Lau- Christian Mouchet: École polytechnique fédérale de Lau- sanne, E-mail: jean-pierre.hubaux@epfl.ch sanne, E-mail: christian.mouchet@epfl.ch Multiparty Homomorphic Encryption from RLWE 292 of parties). Hence, this quadratic factor quickly becomes nantly implemented in generic MPC solutions [5, 36], a bottleneck for large numbers of parties. consists in applying secret-sharing [53] to the input Homomorphic encryption (HE) techniques are well- data. (b) Multiparty encryption schemes (for short: known for reducing the communication complexity of MHE-based), use a homomorphic scheme to encrypt and MPC [24, 30], especially in their various threshold exchange the input data, that can then be computed on and multi-key variants that we generally refer to as non-interactively with encrypted arithmetic. multiparty-HE (MHE). However, in spite of several such LSSS-based MPC (a). Most of the available generic schemes proposed by the cryptographic community, the MPC solutions, such as Sharemind [11] and SPDZ most widely known being the MHE scheme of Asharov [25, 26, 39], apply secret-sharing to the input data. et al. [6], no concrete MPC solution implementing a The evaluation of arithmetic circuits is generally en- generic MHE-based MPC protocol has been built yet. abled by the homomorphism of the LSSS, or by inter- Instead, the use of HE in MPC is mostly confined to active protocols (when no such homomorphism is avail- the offline pre-computations of protocols based on lin- able); the most widely implemented protocol is Beaver’s ear secret-sharing schemes (LSSS) [39]. We argue that triple-based protocol [9]. The strength of approach (a) homomorphic encryption has reached the required level is to enable evaluation through only simple and efficient of usability to play a larger role in the online phase of primitives in terms of which the circuit can be decom- MPC protocols and to enable new applications. posed by code-to-protocol compilers, thus strengthening We propose, implement, and evaluate a new in- usability. However, this approach imposes two practi- stance of the MHE-based MPC protocol in the passive- cal constraints: First, the interactive protocols at each adversary with dishonest-majority model. We make the multiplication gate require all parties to be online and following contributions: active during the whole computation and to exchange – We propose a novel multiparty extension of the BFV messages with their peers at a high frequency that is homomorphic encryption scheme (Section 4). We fol- determined by the round complexity of the circuit. Sec- low the blueprint of Asharov et al. [6] and adapt it ond, the triple-based multiplication protocol requires a to the ring-learning-with-errors (RLWE) assumptions prior distribution of one-time triples; this can be per- and to the BFV scheme. We also introduce novel formed in a pre-computing phase, either by a trusted single-round protocols for bridging between the MHE- third-party or by the parties themselves. The latter and LSSS-based approaches and for bootstrapping a peer-to-peer case can also be formulated as an indepen- BFV ciphertext in multiparty settings. dent, yet equivalent, MPC task (generating the triples – We instantiate our MHE scheme into a generic MPC requires multiparty multiplication). Hence, these ap- protocol (Section 5) and show that this approach proaches are hybrids that generate the triples by using has several advantages over their LSSS-based coun- techniques such as oblivious transfer [38], plain HE [39] terparts: Notably, its per-party communication com- or multiparty-HE [26] in an offline phase. plexity is only linear in the circuit’s inputs and out- As a result of the aforementioned constraints, many puts, and its execution does not require private party- current applications of LSSS-based MPC target the out- to-party communication channels. sourced models where the actual computation is dele- – We demonstrate the efficiency of the latter instan- gated to two parties [4, 21, 22, 37, 46, 47] that are as- tiation for three example MPC circuits (Section 6). sumed not to collude (e.g., the two-cloud model). Un- We implemented and open-sourced our scheme in the fortunately, this assumption might not be realistic in Lattigo library [1]. some contexts where the parties are required to have With these contributions, our work bridges the gap be- an active role in enforcing the access control over their tween the existing theoretical work on MHE-based MPC data (e.g., by law). and its application as privacy-enhancing technologies. MHE-based MPC (b). In this approach, the par- ties use an HE scheme to encrypt their inputs, and the computations are performed using the scheme’s homo- 2 Related Work morphic operations. To preserve the inputs’ privacy, the scheme’s secret key is securely distributed among the parties and the decryption requires the collaboration We classify N-party dishonest-majority MPC ap- between the parties. We use the term multiparty en- proaches in two categories: (a) Linear secret-sharing at cryption scheme to designate these constructions in a data level (for short: LSSS-based), which is predomi- general way (we provide a definition in Section 3.1). Multiparty Homomorphic Encryption from RLWE 293 The idea of reducing the volume of interaction κ and require that the probability of incorrect decryp- in MPC by using threshold homomorphic-encryption tion must be a negligible function in κ. can be traced back to a work by Franklin and Haber [30], later improved by Cramer et al. [24]. At that time, the lack of homomorphic schemes that preserve 3.1 Multiparty Homomorphic Encryption two distinct algebraic operations ruled out complete non-interactivity at the evaluation phase, thus render- Let P = {P1,P2,...,PN } be a set of N parties; a multi- ing these approaches less attractive than approach (a).

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    21 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us