Abstract
Secure Multiparty Computation (MPC) offers privacy-preserving computation that could be critical in many health and finance applications. Specifically, two or more parties jointly compute a function on private inputs by following a protocol executed in rounds. The MPC network typically consists of direct peer-to-peer (P2P) connections among parties. However, this significantly increases the computation time as parties need to wait for messages from each other, thus making network communication a bottleneck. Most recent works tried to address the communication efficiency by focusing on optimizing the MPC protocol rather than the underlying network topologies and protocols. In this paper, we propose the MPC over Algorand Blockchain (MPC-ABC) protocol that packs messages into Algorand transactions and utilizes its fast gossip protocol to transmit them efficiently among MPC parties. Our approach, therefore, reduces the delay and complexity associated with the fully connected P2P network while assuring the integrity of broadcasted data. We implemented MPC-ABC and utilized it to outsource the SPDZ (SPDZ—pronounced “Speedz"—is the nickname of the MPC protocol of Damgård et al. in (European Symposium on Research in Computer Security, pp 1–18, 2013)) protocol across multiple Cloud Service Providers (CSP). Experimental results show that our approach outperforms the commonly adopted approaches over the P2P TCP/IP network in terms of the average delay and network complexity.
Similar content being viewed by others
Availability of Data
Not Applicable.
References
Damgård, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure mpc for dishonest majority–or: breaking the spdz limits. In: European Symposium on Research in Computer Security, pp. 1–18 (2013). Springer
Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. In: International Conference on Financial Cryptography and Data Security, pp. 57–64 (2012). Springer
Damgård, I., Damgård, K., Nielsen, K., Nordholt, P.S., Toft, T.: Confidential benchmarking based on multiparty computation. In: International Conference on Financial Cryptography and Data Security, pp. 169–187 (2016). Springer
Li, D., Liao, X., Xiang, T., Wu, J., Le, J.: Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation. Comput. Secur. 90, 101701 (2020)
Wagh, S., Gupta, D., Chandran, N.: SecureNN: 3-party secure computation for neural network training. Proc. Privacy Enhancing Technol. 2019(3), 26–49 (2019). https://doi.org/10.2478/popets-2019-0035
Bautista, O.G., Akkaya, K.: Network-efficient pipelining-based secure multiparty computation for machine learning applications. In: 2022 IEEE 47th Conference on Local Computer Networks (LCN), pp. 205–213 (2022). https://doi.org/10.1109/LCN53696.2022.9843372
Guerraoui, R., Rodrigues, L.: Reliable broadcast. In: Introduction to Reliable Distributed Programming, pp. 69–134. Springer, Berlin, Heidelberg (2006). https://doi.org/10.1007/3-540-28846-5_3
Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Ind. Inform. 9(4), 2034–2042 (2013). https://doi.org/10.1109/TII.2013.2239301
Hirt, M., Zikas, V.: Adaptively secure broadcast. In: Gilbert, H. (ed.) Advances in Cryptology—EUROCRYPT 2010, pp. 466–485. Springer, Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_24
Chan, T.-H.H., Chung, K.-M., Lin, W.-K., Shi, E.: MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture. In: Vidick, T. (ed.) 11th Innovations in Theoretical Computer Science Conference (ITCS 2020). Leibniz International Proceedings in Informatics (LIPIcs), Vol. 151, pp. 75–17552. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany (2020). https://doi.org/10.4230/LIPIcs.ITCS.2020.75
Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: Scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles. SOSP ’17, pp. 51–68. Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3132747.3132757
Wood, G.: Ethereum, a secure decentralised generalised transaction ledger (2014)
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Technical report (2008). https://bitcoin.org/bitcoin.pdf
Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Annual Cryptology Conference, pp. 643–662 (2012). Springer
Mohassel, P., Zhang, Y.: Secureml: A system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19–38 (2017). https://doi.org/10.1109/SP.2017.12
Lu, D., Yu, A., Kate, A., Maji, H.: Polymath: low-latency mpc via secure polynomial evaluations and its applications. Proc. Privacy Enhancing Technol. 2022(1), 396–416 (2022). https://doi.org/10.2478/popets-2022-0020
Benhamouda, F., Halevi, S., Halevi, T.: Supporting private data on hyperledger fabric with secure multiparty computation. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 357–363 (2018). https://doi.org/10.1109/IC2E.2018.00069
Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolić, M., Cocco, S.W., Yellick, J.: Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. EuroSys ’18. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3190508.3190538
Gao, H., Ma, Z., Luo, S., Wang, Z.: Bfr-mpc: a blockchain-based fair and robust multi-party computation scheme. IEEE Access 7, 110439–110450 (2019). https://doi.org/10.1109/ACCESS.2019.2934147
Lu, D., Yurek, T., Kulshreshtha, S., Govind, R., Kate, A., Miller, A.: Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS ’19, pp. 887–903. Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3319535.3354238
White-City: A framework for massive MPC with partial synchrony and partially authenticated channels. https://github.com/ZenGo-X/white-city/blob/master/White-City-Report/whitecity_new.pdf (2020)
Lindell, Y.: Secure multiparty computation. Commun. ACM 64(1), 86–96 (2020). https://doi.org/10.1145/3387108
Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp. 160–164 (1982). https://doi.org/10.1109/SFCS.1982.38
Beimel, A.: Secret-sharing schemes: A survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) Coding and Cryptology, pp. 11–46. Springer, Berlin (2011). https://doi.org/10.1007/978-3-642-20901-7_2
Bhutta, M.N.M., Khwaja, A.A., Nadeem, A., Ahmad, H.F., Khan, M.K., Hanif, M.A., Song, H., Alshamari, M., Cao, Y.: A survey on blockchain technology: evolution, architecture and security. IEEE Access 9, 61048–61073 (2021). https://doi.org/10.1109/ACCESS.2021.3072849
Algorand-Foundation: Algorand Network Architecture. https://algorand.foundation/algorand-protocol/network. Accessed Oct 2021 (2021)
Algorand: Developer Portal. https://developer.algorand.org/docs/get-started/basics/why_algorand/. Accessed Sept 2021 (2021)
Chen, H., Kim, M., Razenshteyn, I., Rotaru, D., Song, Y., Wagh, S.: Maliciously secure matrix multiplication with applications to private deep learning. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology—ASIACRYPT 2020, pp. 31–59. Springer, Cham (2020)
Rand-Labs: Algorand Blockchain Explorer. https://algoexplorer.io/. Accessed Feb 2022
Dehghan, M., Seetharam, A., Jiang, B., He, T., Salonidis, T., Kurose, J., Towsley, D., Sitaraman, R.: On the Complexity of Optimal Routing and Content Caching in Heterogeneous Networks. arXiv (2015). https://arxiv.org/abs/1501.00216
Chu, W., Dehghan, M., Lui, J.C.S., Towsley, D., Zhang, Z.-L.: Joint Cache Resource Allocation and Request Routing for In-network Caching Services. arXiv (2017). https://arxiv.org/abs/1710.11376
Amiet, N.: Blockchain vulnerabilities in practice. Digital Threats (2021). https://doi.org/10.1145/3407230
Chen, J., Gorbunov, S., Micali, S., Vlachos, G.: ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. Cryptology ePrint Archive, Paper 2018/377 (2018). https://eprint.iacr.org/2018/377
Bautista, O., Akkaya, K., Homsi, S.: Outsourcing secure mpc to untrusted cloud environments with correctness verification. In: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pp. 178–184 (2021). https://doi.org/10.1109/LCN52139.2021.9524971
Keller, M., Orsini, E., Scholl, P.: Mascot: faster malicious arithmetic secure computation with oblivious transfer. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 830–842 (2016)
Keller, M., Pastro, V., Rotaru, D.: Overdrive: making spdz great again. In: Nielsen, J.B., Rijmen, V. (Eds.), Advances in Cryptology—EUROCRYPT 2018, pp. 158–189. Springer, Cham (2018)
Baum, C., Cozzo, D., Smart, N.P.: Using topgear in overdrive: A more efficient zkpok for spdz. In: Paterson, K.G., Stebila, D. (eds.) Selected Areas in Cryptography—SAC 2019, pp. 274–302. Springer, Cham (c2020). https://doi.org/10.1007/978-3-030-38471-5_12
Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) Financial Cryptography and Data Security, pp. 35–50. Springer, Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_6
Algorand: Python Algorand SDK. https://py-algorand-sdk.readthedocs.io/. Accessed October 2021
Funding
This research was supported in part by the Air Force Research Laboratory/Information Directorate (AFRL/RI), contract number FA8750-21-2-0505, and the U.S. National Science Foundation, award number US-NSF-1663051.
Author information
Authors and Affiliations
Contributions
OB developed the Python application used to evaluate the proposed approach and compare it with existing approaches. He also ran most experiments, elaborated figures and tables, and wrote more than 50% of the paper. HM deployed the first private Algorand network, provided the initial ideas to improve communication efficiency with Algorand, and wrote the delay analysis subsection. RH expanded, maintained, and customized the private Algorand network throughout the research. KA and SU elaborated the proposal to obtain funding and provided guidance and recommendations throughout the research. SH provided comments and feedback after iterations of experiments. All authors edited the manuscript across several rounds.
Corresponding author
Ethics declarations
Ethical Approval
Not Applicable.
Financial interests
The authors declare they have no financial interests.
Non-financial interests
The authors declare they have no non-financial interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Approved for Public Release on 05 May 2023; Distribution Unlimited; Case Number: AFRL-2023-2164.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Bautista, O.G., Manshaei, M.H., Hernandez, R. et al. MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation. J Netw Syst Manage 31, 68 (2023). https://doi.org/10.1007/s10922-023-09739-y
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10922-023-09739-y