19 research outputs found
Secure Merge with O(n log log n) Secure Operations
Data-oblivious algorithms are a key component of many secure computation protocols.
In this work, we show that advances in secure multiparty shuffling algorithms can be used
to increase the efficiency of several key cryptographic tools.
The key observation is that many secure computation protocols rely heavily on secure shuffles.
The best data-oblivious shuffling algorithms require , operations,
but in the two-party or multiparty setting, secure shuffling can be achieved with only communication.
Leveraging the efficiency of secure multiparty shuffling, we give novel algorithms that
improve the efficiency of securely sorting sparse lists,
secure stable compaction, and securely merging two sorted lists.
Securely sorting private lists is a key component of many larger secure computation protocols.
The best data-oblivious sorting algorithms for sorting a list of elements require comparisons.
Using black-box access to a linear-communication secure shuffle, we give a secure algorithm for sorting a list of length with
nonzero elements with communication , which beats the best oblivious algorithms when
the number of nonzero elements, , satisfies .
Secure compaction is the problem of removing dummy elements from a list, and
is essentially equivalent to sorting on 1-bit keys.
The best oblivious compaction algorithms run in -time, but they are unstable,
i.e., the order of the remaining elements is not preserved.
Using black-box access to a linear-communication secure shuffle,
we give a stable compaction algorithm with only communication.
Our main result is a novel secure merge protocol.
The best previous algorithms for securely merging two sorted lists into
a sorted whole required secure operations.
Using black-box access to an -communication secure shuffle,
we give the first secure merge algorithm that requires only communication.
Our algorithm takes as input secret-shared values, and outputs a secret-sharing of the sorted list.
All our algorithms are generic, i.e., they can be implemented using generic secure computations
techniques and make black-box access to a secure shuffle.
Our techniques extend naturally to the multiparty situation (with a constant number of parties)
as well as to handle malicious adversaries without changing the asymptotic efficiency.
These algorithm have applications to securely computing database joins and order statistics on private data as well as multiparty Oblivious RAM protocols
Crypto Wash Trading: Direct vs. Indirect Estimation
Recent studies using indirect statistical methods estimate that around 70% of
traded value on centralized crypto exchanges like Binance, can be characterized
as wash trading. This paper turns to NFT markets, where transaction
transparency, including analysis of roundtrip trades and common wallet
activities, allows for more accurate direct estimation methods to be applied.
We find roughly 30% of NFT volume and between 45-95% of traded value, involve
wash trading. More importantly, our approach enables a critical evaluation of
common indirect estimation methods used in the literature. We find major
differences in their effectiveness; some failing entirely. Roundedness filters,
like those used in Cong et al. (2023), emerge as the most accurate. In fact,
the two approaches can be closely aligned via hyper-parameter optimization if
direct data is available
Secure Computation over Lattices and Elliptic Curves
Traditional threshold cryptosystems have decentralized core cryptographic primitives like key generation, decryption and signatures.
Most threshold cryptosystems, however, rely on special purpose protocols that cannot easily be integrated into
more complex multiparty protocols.
In this work, we design and implement decentralized versions of
lattice-based and elliptic-curve-based public-key cryptoystems using
generic secure multiparty computation (MPC) protocols.
These are standard cryptosystems, so we introduce no
additional work for encrypting devices and no
new assumptions beyond those of the generic MPC framework.
Both cryptosystems are also additively homomorphic,
which allows for secure additions directly on ciphertexts.
By using generic MPC techniques,
our multiparty decryption protocols compute secret-shares of the plaintext,
whereas most special-purpose cryptosystems either do not support decryption
or must reveal the decryptions in the clear.
Our method allows complex functions to be securely evaluated after decryption,
revealing only the results of the functions and not the plaintexts themselves.
To improve performance, we present a novel oblivious elliptic curve multiplication
protocol and a new noise-masking technique which may be of independent interest.
We implemented our protocols using the SCALE-MAMBA secure multiparty computation platform,
which provides security against malicious adversaries and supports arbitrary numbers of participants
Token-weighted crowdsourcing
Blockchain-based platforms often rely on token-weighted voting (âÏ-weightingâ) to efficiently crowdsource information from their users for a wide range of applications, including content curation and on-chain governance. We examine the effectiveness of such decentralized platforms for harnessing the wisdom and effort of the crowd. We find that Ï-weighting generally discourages truthful voting and erodes the platformâs predictive power unless users are âstrategic enoughâ to unravel the underlying aggregation mechanism. Platform accuracy decreases with the number of truthful users and the dispersion in their token holdings, and in many cases, platforms would be better off with a âflatâ 1/n mechanism. When, prior to voting, strategic users can exert effort to endogenously improve their signals, users with more tokens generally exert more effortâa feature often touted in marketing materials as a core advantage of Ï-weightingâhowever, this feature is not attributable to the mechanism itself, and more importantly, the ensuing equilibrium fails to achieve the first-best accuracy of a centralized platform. The optimality gap decreases as the distribution of tokens across users approaches a theoretical optimum, which we derive, but tends to increase with the dispersion in usersâ token holdings. This paper was accepted by Gabriel Weintraub, revenue management and market analytics.Published versio
Scaling blockchains: can committee-based consensus help?
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3914471First author draf
Proactive Secret Sharing with Constant Communication
This paper presents the first protocols for Proactive Secret Sharing (PSS) that only require constant (in the number of parties, ) communication per party per epoch. By harnessing the power of expander graphs, we are able to obtain strong guarantees about the security of the system. We present the following PSS protocols:
â A PSS protocol that provides privacy (but no robustness) against an adversary controlling parties per epoch.
â A PSS protocol that provides robustness (but no privacy) against an adversary controlling parties per epoch.
â A PSS protocol that provides privacy against an adversary controlling parties per epoch and provides robustness against an adversary controlling parties per epoch, for any constant . Instantiating this with gives a PSS protocol that is proactively secure (private and robust) against an adversary controlling parties per epoch.
Additionally, we discuss how secure channels, whose existence is usually assumed by PSS protocols, are challenging to create in the mobile adversary setting, and we present a method to instantiate them from a weaker assumption
3-Party Distributed ORAM from Oblivious Set Membership
Distributed Oblivious RAM (DORAM) protocols allow a group of participants to obliviously access a secret-shared array at a secret-shared index, and DORAM is the key tool for secure multiparty
computation (MPC) in the RAM model.
In this work, we present a novel 3-party semi-honest DORAM protocol with O((Îș + D) log N) communication per access, where N is the size of the memory, Îș is a security parameter and D is the block size. Our protocol performs polylogarithmic computation and does not require homomorphic encryption. Under natural parameter choices, this is the most communication-efficient DORAM with these properties.
To build this DORAM protocol, we first present an extremely efficient oblivious data structure for answering set membership queries. From this we build an oblivious hash table with asymptotically optimal memory usage and access cost and with negligible failure probability. We believe these are of independent interest
Private Set Intersection with Linear Communication from General Assumptions
This work presents a hashing-based algorithm for Private Set Intersection (PSI) in
the honest-but-curious setting. The protocol is generic, modular and provides both asymptotic
and concrete efficiency improvements over existing PSI protocols.
If each player has elements, our scheme requires only O(m \secpar) communication between the parties,
where \secpar is a security parameter.
Our protocol builds on the hashing-based PSI protocol of Pinkas et al. (USENIX 2014, USENIX 2015),
but we replace one of the sub-protocols (handling the cuckoo ``stash\u27\u27) with a special-purpose PSI protocol
that is optimized for comparing sets of unbalanced size.
This brings the asymptotic communication complexity of the overall protocol down from \omega(m \secpar) to O(m\secpar),
and provides concrete performance improvements (10-15\% reduction in communication costs) over Kolesnikov et al. (CCS 2016)
under real-world parameter choices.
Our protocol is simple, generic and benefits from the permutation-hashing optimizations of Pinkas et al. (USENIX 2015) and the
Batched, Relaxed Oblivious Pseudo Random Functions of Kolesnikov et al. (CCS 2016)
A Linear-Time 2-Party Secure Merge Protocol
We present a linear-time, space and communication data-oblivious algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the two party setting. Although merging two sorted lists can be done insecurely in linear time, previous secure merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to obliviously traverse permuted lists in sorted order.
Our algorithm only requires black-box use of the underlying Additively Homomorphic cryptosystem and generic secure computation schemes for comparison and equality testing