Skip to main content
Log in

MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Secure Multiparty Computation (MPC) offers privacy-preserving computation that could be critical in many health and finance applications. Specifically, two or more parties jointly compute a function on private inputs by following a protocol executed in rounds. The MPC network typically consists of direct peer-to-peer (P2P) connections among parties. However, this significantly increases the computation time as parties need to wait for messages from each other, thus making network communication a bottleneck. Most recent works tried to address the communication efficiency by focusing on optimizing the MPC protocol rather than the underlying network topologies and protocols. In this paper, we propose the MPC over Algorand Blockchain (MPC-ABC) protocol that packs messages into Algorand transactions and utilizes its fast gossip protocol to transmit them efficiently among MPC parties. Our approach, therefore, reduces the delay and complexity associated with the fully connected P2P network while assuring the integrity of broadcasted data. We implemented MPC-ABC and utilized it to outsource the SPDZ (SPDZ—pronounced “Speedz"—is the nickname of the MPC protocol of Damgård et al. in (European Symposium on Research in Computer Security, pp 1–18, 2013)) protocol across multiple Cloud Service Providers (CSP). Experimental results show that our approach outperforms the commonly adopted approaches over the P2P TCP/IP network in terms of the average delay and network complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of Data

Not Applicable.

References

  1. Damgård, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure mpc for dishonest majority–or: breaking the spdz limits. In: European Symposium on Research in Computer Security, pp. 1–18 (2013). Springer

  2. Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. In: International Conference on Financial Cryptography and Data Security, pp. 57–64 (2012). Springer

  3. Damgård, I., Damgård, K., Nielsen, K., Nordholt, P.S., Toft, T.: Confidential benchmarking based on multiparty computation. In: International Conference on Financial Cryptography and Data Security, pp. 169–187 (2016). Springer

  4. Li, D., Liao, X., Xiang, T., Wu, J., Le, J.: Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation. Comput. Secur. 90, 101701 (2020)

    Article  Google Scholar 

  5. Wagh, S., Gupta, D., Chandran, N.: SecureNN: 3-party secure computation for neural network training. Proc. Privacy Enhancing Technol. 2019(3), 26–49 (2019). https://doi.org/10.2478/popets-2019-0035

    Article  Google Scholar 

  6. Bautista, O.G., Akkaya, K.: Network-efficient pipelining-based secure multiparty computation for machine learning applications. In: 2022 IEEE 47th Conference on Local Computer Networks (LCN), pp. 205–213 (2022). https://doi.org/10.1109/LCN53696.2022.9843372

  7. Guerraoui, R., Rodrigues, L.: Reliable broadcast. In: Introduction to Reliable Distributed Programming, pp. 69–134. Springer, Berlin, Heidelberg (2006). https://doi.org/10.1007/3-540-28846-5_3

  8. Groza, B., Murvay, S.: Efficient protocols for secure broadcast in controller area networks. IEEE Trans. Ind. Inform. 9(4), 2034–2042 (2013). https://doi.org/10.1109/TII.2013.2239301

    Article  Google Scholar 

  9. Hirt, M., Zikas, V.: Adaptively secure broadcast. In: Gilbert, H. (ed.) Advances in Cryptology—EUROCRYPT 2010, pp. 466–485. Springer, Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13190-5_24

  10. Chan, T.-H.H., Chung, K.-M., Lin, W.-K., Shi, E.: MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture. In: Vidick, T. (ed.) 11th Innovations in Theoretical Computer Science Conference (ITCS 2020). Leibniz International Proceedings in Informatics (LIPIcs), Vol. 151, pp. 75–17552. Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany (2020). https://doi.org/10.4230/LIPIcs.ITCS.2020.75

  11. Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: Scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles. SOSP ’17, pp. 51–68. Association for Computing Machinery, New York, NY, USA (2017). https://doi.org/10.1145/3132747.3132757

  12. Wood, G.: Ethereum, a secure decentralised generalised transaction ledger (2014)

  13. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system. Technical report (2008). https://bitcoin.org/bitcoin.pdf

  14. Damgård, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Annual Cryptology Conference, pp. 643–662 (2012). Springer

  15. Mohassel, P., Zhang, Y.: Secureml: A system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19–38 (2017). https://doi.org/10.1109/SP.2017.12

  16. Lu, D., Yu, A., Kate, A., Maji, H.: Polymath: low-latency mpc via secure polynomial evaluations and its applications. Proc. Privacy Enhancing Technol. 2022(1), 396–416 (2022). https://doi.org/10.2478/popets-2022-0020

    Article  Google Scholar 

  17. Benhamouda, F., Halevi, S., Halevi, T.: Supporting private data on hyperledger fabric with secure multiparty computation. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 357–363 (2018). https://doi.org/10.1109/IC2E.2018.00069

  18. Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolić, M., Cocco, S.W., Yellick, J.: Hyperledger fabric: A distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. EuroSys ’18. Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3190508.3190538

  19. Gao, H., Ma, Z., Luo, S., Wang, Z.: Bfr-mpc: a blockchain-based fair and robust multi-party computation scheme. IEEE Access 7, 110439–110450 (2019). https://doi.org/10.1109/ACCESS.2019.2934147

    Article  Google Scholar 

  20. Lu, D., Yurek, T., Kulshreshtha, S., Govind, R., Kate, A., Miller, A.: Honeybadgermpc and asynchromix: Practical asynchronous mpc and its application to anonymous communication. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. CCS ’19, pp. 887–903. Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3319535.3354238

  21. White-City: A framework for massive MPC with partial synchrony and partially authenticated channels. https://github.com/ZenGo-X/white-city/blob/master/White-City-Report/whitecity_new.pdf (2020)

  22. Lindell, Y.: Secure multiparty computation. Commun. ACM 64(1), 86–96 (2020). https://doi.org/10.1145/3387108

    Article  Google Scholar 

  23. Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp. 160–164 (1982). https://doi.org/10.1109/SFCS.1982.38

  24. Beimel, A.: Secret-sharing schemes: A survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) Coding and Cryptology, pp. 11–46. Springer, Berlin (2011). https://doi.org/10.1007/978-3-642-20901-7_2

  25. Bhutta, M.N.M., Khwaja, A.A., Nadeem, A., Ahmad, H.F., Khan, M.K., Hanif, M.A., Song, H., Alshamari, M., Cao, Y.: A survey on blockchain technology: evolution, architecture and security. IEEE Access 9, 61048–61073 (2021). https://doi.org/10.1109/ACCESS.2021.3072849

    Article  Google Scholar 

  26. Algorand-Foundation: Algorand Network Architecture. https://algorand.foundation/algorand-protocol/network. Accessed Oct 2021 (2021)

  27. Algorand: Developer Portal. https://developer.algorand.org/docs/get-started/basics/why_algorand/. Accessed Sept 2021 (2021)

  28. Chen, H., Kim, M., Razenshteyn, I., Rotaru, D., Song, Y., Wagh, S.: Maliciously secure matrix multiplication with applications to private deep learning. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology—ASIACRYPT 2020, pp. 31–59. Springer, Cham (2020)

  29. Rand-Labs: Algorand Blockchain Explorer. https://algoexplorer.io/. Accessed Feb 2022

  30. Dehghan, M., Seetharam, A., Jiang, B., He, T., Salonidis, T., Kurose, J., Towsley, D., Sitaraman, R.: On the Complexity of Optimal Routing and Content Caching in Heterogeneous Networks. arXiv (2015). https://arxiv.org/abs/1501.00216

  31. Chu, W., Dehghan, M., Lui, J.C.S., Towsley, D., Zhang, Z.-L.: Joint Cache Resource Allocation and Request Routing for In-network Caching Services. arXiv (2017). https://arxiv.org/abs/1710.11376

  32. Amiet, N.: Blockchain vulnerabilities in practice. Digital Threats (2021). https://doi.org/10.1145/3407230

    Article  Google Scholar 

  33. Chen, J., Gorbunov, S., Micali, S., Vlachos, G.: ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement. Cryptology ePrint Archive, Paper 2018/377 (2018). https://eprint.iacr.org/2018/377

  34. Bautista, O., Akkaya, K., Homsi, S.: Outsourcing secure mpc to untrusted cloud environments with correctness verification. In: 2021 IEEE 46th Conference on Local Computer Networks (LCN), pp. 178–184 (2021). https://doi.org/10.1109/LCN52139.2021.9524971

  35. Keller, M., Orsini, E., Scholl, P.: Mascot: faster malicious arithmetic secure computation with oblivious transfer. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 830–842 (2016)

  36. Keller, M., Pastro, V., Rotaru, D.: Overdrive: making spdz great again. In: Nielsen, J.B., Rijmen, V. (Eds.), Advances in Cryptology—EUROCRYPT 2018, pp. 158–189. Springer, Cham (2018)

  37. Baum, C., Cozzo, D., Smart, N.P.: Using topgear in overdrive: A more efficient zkpok for spdz. In: Paterson, K.G., Stebila, D. (eds.) Selected Areas in Cryptography—SAC 2019, pp. 274–302. Springer, Cham (c2020). https://doi.org/10.1007/978-3-030-38471-5_12

  38. Catrina, O., Saxena, A.: Secure computation with fixed-point numbers. In: Sion, R. (ed.) Financial Cryptography and Data Security, pp. 35–50. Springer, Berlin, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14577-3_6

  39. Algorand: Python Algorand SDK. https://py-algorand-sdk.readthedocs.io/. Accessed October 2021

Download references

Funding

This research was supported in part by the Air Force Research Laboratory/Information Directorate (AFRL/RI), contract number FA8750-21-2-0505, and the U.S. National Science Foundation, award number US-NSF-1663051.

Author information

Authors and Affiliations

Authors

Contributions

OB developed the Python application used to evaluate the proposed approach and compare it with existing approaches. He also ran most experiments, elaborated figures and tables, and wrote more than 50% of the paper. HM deployed the first private Algorand network, provided the initial ideas to improve communication efficiency with Algorand, and wrote the delay analysis subsection. RH expanded, maintained, and customized the private Algorand network throughout the research. KA and SU elaborated the proposal to obtain funding and provided guidance and recommendations throughout the research. SH provided comments and feedback after iterations of experiments. All authors edited the manuscript across several rounds.

Corresponding author

Correspondence to Oscar G. Bautista.

Ethics declarations

Ethical Approval

Not Applicable.

Financial interests

The authors declare they have no financial interests.

Non-financial interests

The authors declare they have no non-financial interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Approved for Public Release on 05 May 2023; Distribution Unlimited; Case Number: AFRL-2023-2164.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bautista, O.G., Manshaei, M.H., Hernandez, R. et al. MPC-ABC: Blockchain-Based Network Communication for Efficiently Secure Multiparty Computation. J Netw Syst Manage 31, 68 (2023). https://doi.org/10.1007/s10922-023-09739-y

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10922-023-09739-y

Keywords

Navigation