International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Masked Triples: Amortizing Multiplication Triples across Conditionals

Authors:
David Heath
Vladimir Kolesnikov
Stanislav Peceny
Download:
DOI: 10.1007/978-3-030-75248-4_12
Search ePrint
Search Google
Abstract: A classic approach to MPC uses preprocessed multiplication triples to evaluate arbitrary Boolean circuits. If the target circuit features conditional branching, e.g. as the result of a IF program statement, then triples are wasted: one triple is consumed per AND gate, even if the output of the gate is entirely discarded by the circuit’s conditional behavior. In this work, we show that multiplication triples can be re-used across conditional branches. For a circuit with b branches, each having n AND gates, we need only a total of n triples, rather than the typically required bn. Because preprocessing triples is often the most expensive step in protocols that use them, this significantly improves performance. Prior work similarly amortized oblivious transfers across branches in the classic GMW protocol (Heath et al., Asiacrypt 2020, [HKP20]). In addition to demonstrating conditional improvements are possible for a different class of protocols, we also concretely improve over [HKP20]: their maximum improvement is bounded by the topology of the circuit. Our protocol yields improvement independent of topology: we need triples proportional to the size of the program’s longest execution path, regardless of the structure of the program branches. We implemented our approach in C++. Our experiments show that we significantly improve over a "naive" protocol and over prior work: for a circuit with 16 branches and in terms of total communication, we improved over naive by 12x and over [HKP20] by an average of 2.6x. Our protocol is secure against the semi-honest corruption of p-1 parties.
Video from PKC 2021
BibTeX
@article{pkc-2021-30974,
  title={Masked Triples: Amortizing Multiplication Triples across Conditionals},
  booktitle={Public-Key Cryptography - PKC 2021},
  publisher={Springer},
  doi={10.1007/978-3-030-75248-4_12},
  author={David Heath and Vladimir Kolesnikov and Stanislav Peceny},
  year=2021
}