skip to main content
10.1145/3548606.3559369acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

PentaGOD: Stepping beyond Traditional GOD with Five Parties

Published: 07 November 2022 Publication History

Abstract

Secure multiparty computation (MPC) is increasingly being used to address privacy issues in various applications. The recent work of Alon et al. (CRYPTO'20) identified the shortcomings of traditional MPC and defined a Friends-and-Foes (FaF) security notion to address the same. We showcase the need for FaF security in real-world applications such as dark pools. This subsequently necessitates designing concretely efficient FaF-secure protocols. Towards this, keeping efficiency at the center stage, we design ring-based FaF-secure MPC protocols in the small-party honest-majority setting. Specifically, we provide (1,1)-FaF secure 5 party computation protocols (5PC) that consider one malicious and one semi-honest corruption and constitutes the optimal setting for attaining honest-majority. At the heart of it lies the multiplication protocol that requires a single round of communication with 8 ring elements (amortized). To facilitate having FaF-secure variants for several applications, we design a variety of building blocks optimized for our FaF setting. The practicality of the designed (1,1)-FaF secure 5PC framework is showcased by benchmarking dark pools. In the process, we also improve the efficiency and security of the dark pool protocols over the existing traditionally secure ones. This improvement is witnessed as a gain of up to 62x in throughput compared to the existing ones. Finally, to demonstrate the versatility of our framework, we also benchmark popular deep neural networks.

Supplementary Material

MP4 File (CCS22-fp0248.mp4)
Secure multiparty computation (MPC) is increasingly being used to address privacy issues in various applications. Work of Alon et al. (CRYPTO'20) identified shortcomings of traditional MPC and defined a Friends-and-Foes (FaF) security notion to address the same. We showcase the need for FaF security in real-world applications such as dark pools. This subsequently necessitates designing concretely efficient FaF-secure protocols. Towards this, keeping efficiency at center stage, we design ring-based FaF-secure MPC protocols in small-party honest-majority setting. Specifically, we provide (1,1)-FaF secure 5 party computation protocols (5PC) that consider one malicious and one semi-honest corruption and constitutes optimal setting for attaining honest-majority. At its core, lies the multiplication protocol that requires a single round of communication with 8 ring elements (amortized). The practicality of our framework is showcased by benchmarking dark pools and popular deep neural networks.

References

[1]
Bar Alon, Eran Omri, and Anat Paskin-Cherniavsky. 2020. MPC with Friends and Foes. In CRYPTO.
[2]
Toshinori Araki, Assi Barak, Jun Furukawa, Tamar Lichter, Yehuda Lindell, Ariel Nof, Kazuma Ohara, Adi Watzman, and Or Weinstein. 2017. Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. In IEEE S&P.
[3]
Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, and Kazuma Ohara. 2016. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. In ACM CCS.
[4]
Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, and Bobby Bhattacharjee. 2020. Finding Safety in Numbers with Secure Allegation Escrows. In NDSS.
[5]
Gilad Asharov, Tucker Hybinette Balch, Antigoni Polychroniadou, and Manuela Veloso. 2020. Privacy-Preserving Dark Pools. In AAMAS.
[6]
Azer Bestavros, Andrei Lapets, and Mayank Varia. 2017. User-centric distributed solutions for privacy-preserving analytics. Communications of ACM (2017).
[7]
Dan Bogdanov, Marko J oemets, Sander Siim, and Meril Vaht. 2015. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. In FC.
[8]
Peter Bogetoft, Dan Lund Christensen, Ivan Damgård, Martin Geisler, Thomas Jakobsen, Mikkel Krøigaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, et al. 2009. Secure multiparty computation goes live. In FC.
[9]
Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, and Yuval Ishai. 2019. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. In CRYPTO.
[10]
Elette Boyle, Niv Gilboa, Yuval Ishai, and Ariel Nof. 2019. Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs. In ACM CCS.
[11]
Elette Boyle, Niv Gilboa, Yuval Ishai, and Ariel Nof. 2020. Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs. In ASIACRYPT.
[12]
Megha Byali, Harsh Chaudhari, Arpita Patra, and Ajith Suresh. 2020. FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. PETS (2020).
[13]
Megha Byali, Carmit Hazay, Arpita Patra, and Swati Singla. 2019. Fast actively secure five-party computation with security beyond abort. In ACM CCS.
[14]
Megha Byali, Arun Joseph, Arpita Patra, and Divya Ravi. 2018. Fast Secure Computation for Small Population over the Internet. In ACM CCS.
[15]
John Cartlidge, Nigel P Smart, and Younes Talibi Alaoui. 2019. MPC joins the dark side. In ACM ASIACCS.
[16]
John Cartlidge, Nigel P Smart, and Younes Talibi Alaoui. 2021. Multi-party computation mechanism for anonymous equity block trading: A secure implementation of turquoise plato uncross. Intell. Syst. Account. Finance Manag. (2021).
[17]
Harsh Chaudhari, Ashish Choudhury, Arpita Patra, and Ajith Suresh. 2019. ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. In ACM CCSW@CCS.
[18]
Harsh Chaudhari, Rahul Rachuri, and Ajith Suresh. 2020. Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. NDSS (2020).
[19]
Richard Cleve. 1986. Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract). In ACM STOC.
[20]
Cryptography and Privacy Engineering Group at TU Darmstadt. [n.,d.]. ENCRYPTO Utils. https://github.com/encryptogroup/ENCRYPTO_utils.
[21]
Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P Smart, and Younes Talibi Alaoui. 2021. Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets. IACR Cryptol. ePrint Arch. (2021).
[22]
Anders Dalskov, Daniel Escudero, and Marcel Keller. 2020. Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. USENIX security.
[23]
Ivan Damgård and Jesper Buus Nielsen. 2007. Scalable and unconditionally secure multiparty computation. In CRYPTO.
[24]
Xiao Dong, David A Randolph, Chenkai Weng, Abel N Kho, Jennie M Rogers, and Xiao Wang. 2021. Developing High Performance Secure Multi-Party Computation Protocols in Healthcare: A Case Study of Patient Risk Stratification. In AMIA.
[25]
Jun Furukawa, Yehuda Lindell, Ariel Nof, and Or Weinstein. 2017. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. In EUROCRYPT.
[26]
S. Dov Gordon, Samuel Ranellucci, and Xiao Wang. 2018. Secure Computation with Low Communication from Cross-Checking. In ASIACRYPT.
[27]
T Ryan Hoens, Marina Blanton, and Nitesh V Chawla. 2010. A private and reliable recommendation system for social networks. In IEEE. IEEE.
[28]
Nishat Koti, Mahak Pancholi, Arpita Patra, and Ajith Suresh. 2021. SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. IACR Cryptol. ePrint Arch. (2021).
[29]
Nishat Koti, Arpita Patra, Rahul Rachuri, and Ajith Suresh. 2022. Tetrad: Actively Secure 4PC for Secure Training and Inference. IACR Cryptol. ePrint Arch.
[30]
Alex Krizhevsky, Vinod Nair, and Geoffrey Hinton. 2014. The CIFAR-10 dataset. (2014). thtps://www.cs.toronto.edu/ kriz/cifar.html.
[31]
Benjamin Kuykendall, Hugo Krawczyk, and Tal Rabin. 2019. Cryptography for# metoo. PETS (2019).
[32]
Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE (1998).
[33]
Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http://yann.lecun.com/exdb/mnist/.
[34]
Payman Mohassel and Peter Rindal. 2018. ABY(3): A Mixed Protocol Framework for Machine Learning. In ACM CCS.
[35]
Payman Mohassel, Mike Rosulek, and Ye Zhang. 2015. Fast and Secure Three-party Computation: The Garbled Circuit Approach. In ACM CCS.
[36]
Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE S&P.
[37]
Peter Sebastian Nordholt and Meilof Veeningen. 2018. Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification. In ACNS.
[38]
United States of America before the Securities and Exchange Commission. 2005. SEC institutes enforcement action against 20 former New York Stock Exchange specialists alleging pervasive course of fraudulent trading. Press Release. https://www.sec.gov/news/press/2005-54.htm.
[39]
United States of America before the Securities and Exchange Commission. 2011. In the Matter of Pipeline Trading Systems LLC, et al., Securities Exchange Act of 1934 Release No. 65609. https://www.sec.gov/litigation/admin/2011/33-9271.pdf.
[40]
United States of America before the Securities and Exchange Commission. 2012. In the Matter of eBX, LLC Securities Exchange Act of 1934 Release No. 67979. https://www.sec.gov/litigation/admin/2012/34-67969.pdf.
[41]
United States of America before the Securities and Exchange Commission. 2014a. In the Matter of LavaFlow, Inc. Securities Exchange Act of 1934 Release No. 72673. https://www.sec.gov/litigation/admin/2014/34-72673. pdf.
[42]
United States of America before the Securities and Exchange Commission. 2014b. In the Matter of Liquidnet, Inc., Securities Exchange Act of 1934 Release No. 72339. https://www.sec.gov/litigation/admin/2014/33-9596.pdf.
[43]
United States of America before the Securities and Exchange Commission. 2016. In the Matter of Credit Suisse Securities (USA) LLC, Securities Exchange Act of 1934 Release No. 77002. https://www.sec.gov/litigation/admin/2016/33-10013.pdf.
[44]
United States of America before the Securities and Exchange Commission. 2018. In the Matter of ITG Inc. and Alternet Securities, Inc., Securities Exchange Act of 1934 Release No. 84548. https://www.sec.gov/litigation/admin/2018/33-10572.pdf.
[45]
Satsuya Ohata and Koji Nuida. 2020. Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.
[46]
Arpita Patra, Thomas Schneider, Ajith Suresh, and Hossein Yalame. 2021. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In USENIX, Michael Bailey and Rachel Greenstadt (Eds.).
[47]
Arpita Patra and Ajith Suresh. 2020. BLAZE: Blazing Fast Privacy-Preserving Machine Learning. NDSS (2020).
[48]
Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, and Daniël Worm. 2019. Secure multiparty PageRank algorithm for collaborative fraud detection. In FC. Springer.
[49]
Erez Shmueli and Tamir Tassa. 2017. Secure multi-party protocols for item-based collaborative filtering. In ACM RecSys.
[50]
Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. ICLR (2015).
[51]
Stanford. [n.,d.]. CS231n: Convolutional Neural Networks for Visual Recognition. https://cs231n.github.io/convolutional-networks/
[52]
Christina-Angeliki Toli, Abdelrahaman Aly, and Bart Preneel. 2016. A privacy-preserving model for biometric fusion. In CANS.
[53]
Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin. 2021. FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. PoPETs (2021).

Cited By

View all
  • (2025)Secure Five-Party Computation with Private Robustness and Minimal Online CommunicationProvable and Practical Security10.1007/978-981-96-0954-3_3(43-62)Online publication date: 1-Feb-2025
  • (2024)Sublinear Distributed Product Checks on Replicated Secret-Shared Data over Z2 Without Ring ExtensionsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690260(825-839)Online publication date: 2-Dec-2024
  • (2024)Asterisk: Super-fast MPC with a Friend2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00128(542-560)Online publication date: 19-May-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
November 2022
3598 pages
ISBN:9781450394505
DOI:10.1145/3548606
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dark pools
  2. friends-and-foes (faf) security
  3. honest majority
  4. multi-party computation
  5. privacy-preserving machine learning

Qualifiers

  • Research-article

Conference

CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)46
  • Downloads (Last 6 weeks)3
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Secure Five-Party Computation with Private Robustness and Minimal Online CommunicationProvable and Practical Security10.1007/978-981-96-0954-3_3(43-62)Online publication date: 1-Feb-2025
  • (2024)Sublinear Distributed Product Checks on Replicated Secret-Shared Data over Z2 Without Ring ExtensionsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690260(825-839)Online publication date: 2-Dec-2024
  • (2024)Asterisk: Super-fast MPC with a Friend2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00128(542-560)Online publication date: 19-May-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media