Efficient two-round OT extension and silent non-interactive secure computation

Elette Boyle, Yuval Ishai, Geoffroy Couteau, Lisa Kohl, Peter Scholl, Niv Gilboa, Peter Rindal

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    113 Scopus citations

    Abstract

    We consider the problem of securely generating useful instances of two-party correlations, such as many independent copies of a random oblivious transfer (OT) correlation, using a small amount of communication. This problem is motivated by the goal of secure computation with silent preprocessing, where a low-communication input-independent setup, followed by local (“silent”) computation, enables a lightweight “non-cryptographic” online phase once the inputs are known. Recent works of Boyle et al. (CCS 2018, Crypto 2019) achieve this goal with good concrete efficiency for useful kinds of two-party correlations, including OT correlations, under different variants of the Learning Parity with Noise (LPN) assumption, and using a small number of “base” oblivious transfers. The protocols of Boyle et al. have several limitations. First, they require a large number of communication rounds. Second, they are only secure against semi-honest parties. Finally, their concrete efficiency estimates are not backed by an actual implementation. In this work we address these limitations, making three main contributions: • Eliminating interaction. Under the same assumption, we obtain the first concretely efficient 2-round protocols for generating useful correlations, including OT correlations, in the semi-honest security model. This implies the first efficient 2-round OT extension protocol of any kind and, more generally, protocols for non-interactive secure computation (NISC) that are concretely efficient and have the silent preprocessing feature. • Malicious security. We provide security against malicious parties without additional interaction and with only a modest overhead; prior to our work, no similar protocols were known with any number of rounds. • Implementation. Finally, we implemented, optimized, and bench-marked our 2-round OT extension protocol, demonstrating that it offers a more attractive alternative to the OT extension protocol of Ishai et al. (Crypto 2003) in many realistic settings.

    Original languageEnglish
    Title of host publicationCCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
    PublisherAssociation for Computing Machinery
    Pages291-308
    Number of pages18
    ISBN (Electronic)9781450367479
    DOIs
    StatePublished - 6 Nov 2019
    Event26th ACM SIGSAC Conference on Computer and Communications Security, CCS 2019 - London, United Kingdom
    Duration: 11 Nov 201915 Nov 2019

    Publication series

    NameProceedings of the ACM Conference on Computer and Communications Security
    ISSN (Print)1543-7221

    Conference

    Conference26th ACM SIGSAC Conference on Computer and Communications Security, CCS 2019
    Country/TerritoryUnited Kingdom
    CityLondon
    Period11/11/1915/11/19

    Keywords

    • Active security
    • Oblivious transfer extension
    • Pseudorandom correlation generators
    • Secure computation

    ASJC Scopus subject areas

    • Software
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Efficient two-round OT extension and silent non-interactive secure computation'. Together they form a unique fingerprint.

    Cite this