Abstract
We propose a novel framework, \(\texttt{Manticore}\), for multiparty computations, with full threshold and semi-honest security model, supporting a combination of real number arithmetic (arithmetic shares), Boolean arithmetic (Boolean shares) and garbled circuits (Yao shares). In contrast to prior work (Mohassel and Zhang, in 2017 IEEE symposium on security and privacy (SP), 2017; Mohassel and Rindal, in Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 2018), \(\texttt{Manticore}\) mitigates overflows, which is of paramount importance for machine learning applications, without compromising efficiency or security. Compared to other overflow-free recent techniques such as MP-SPDZ (Escudero et al., in 40th annual international cryptology conference, CRYPTO. Lecture notes in computer science, 2020) that convert arithmetic to Boolean shares, \(\texttt{Manticore}\) uses an efficient modular lifting/truncation method that allows for scalable high numerical precision computations with optimal numerical windows and hence, highly efficient online phases. We adapt basic MPC operations such as real-valued polynomial evaluation, division, logarithms, exponentials, Fourier series evaluations and oblivious comparisons to \(\texttt{Manticore}\) by employing our modular lift in combination with existing efficient conversions between arithmetic, Boolean and Yao shares. We also describe a highly scalable computations of logistic regression models with real-world training data sizes and high numerical precision through PCA and blockwise variants (for memory and runtime optimizations) based on second-order optimization techniques. On a dataset of 50 M samples and 50 features distributed among two players, the online phase completes in 14.5 h with at least 10 decimal digits of precision compared to plaintext training. The setup phase of \(\texttt{Manticore}\) is supported in both the trusted dealer and the interactive models allowing for tradeoffs between efficiency and stronger security. The highly efficient online phase makes the framework particularly suitable for MPC applications where the output of the setup phase is part of the input of the protocol (such as MPC-in-the-head or Prio).
Similar content being viewed by others
Notes
A scheme is called t-out-of-n threshold secret sharing scheme if fulfil the requirements: any subset of t or more of the parties can reconstruct the secret, yet no subset of \(t-1\) fewer parties can learn anything about the secret.
\(\mathcal {M}_{M,\ell }\) can be viewed as \(\sum _{i=\ell }^{M-1} m_i2^i \mod 2^{M}, \quad \text {for} \quad m_i \in \{0,1\}\).
The choice of 58 above in order to resemble the plaintext of type \(\texttt {float64}\), whereby the mantissa is 53 bits.
A set of vectors is orthonormal if every vector in the set has norm 1 and the set of vectors are mutually orthogonal.
This is done in two steps: (1) Player i locally computes \(\pi _i(a_i)\) and updates its share of y to \(\pi _i(a_i)\) minus its share of \(\pi _i(\lambda _i)\); (2) Everyone else updates its share of y to the negative of its share of \(\pi _i( \lambda _i )\).
References
M. Al-Rubaie, P.Y. Wu, J.M. Chang, S.Y. Kung, Privacy-preserving PCA on horizontally-partitioned data, in 2017 IEEE Conference on Dependable and Secure Computing (2017), pp. 280–287
M. Aliasgari, M. Blanton, Y. Zhang, A. Steele, Secure computation on floating point numbers, in NDSS (2013)
A. Aly, N.P. Smart, Benchmarking privacy preserving scientific operations, in International Conference on Applied Cryptography and Network Security (2019), pp 509–529
T. Araki, J. Furukawa, Y. Lindell, A. Nof, K. Ohara, High-throughput semi-honest secure three-party computation with an honest majority, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16 (2016), pp. 805–817
Aumüller, M., Dietzfelbinger, M., Klaue, P.: How good is multi-pivot quicksort? ACM Transactions on Algorithms (TALG) 13(1), 1–47 (2016)
D. Beaver, Efficient multiparty protocols using circuit randomization, in CRYPTO ’91. Lecture Notes in Computer Science, vol. 576 (1992), pp. 420–432
D. Beaver, S. Micali, P. Rogaway, The round complexity of secure protocols (extended abstract), in Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13–17, 1990, Baltimore, Maryland, USA (1990), pp. 503–513
D. Bogdanov, S. Laur, J. Willemson, Sharemind: A framework for fast privacy-preserving computations, in European Symposium on Research in Computer Security (2008), pp. 192–206
D. Bogdanov, P. Laud, J. Randmets, Domain-polymorphic language for privacy-preserving applications, in Proceedings of the First ACM Workshop on Language Support for Privacy-Enhancing Technologies (2013), pp. 23–26
D. Bogdanov, R. Talviste, J. Willemson, Deploying secure multi-party computation for financial data analysis, in International Conference on Financial Cryptography and Data Security (2012), pp. 57–64
C. Boura, I. Chillotti, N. Gama, D. Jetchev, S. Peceny, A. Petric, High-precision privacy-preserving real-valued function evaluation, in International Conference on Financial Cryptography and Data Security (2018), pp. 183–202
E. Boyle, N. Gilboa, Y. Ishai, A. Nof, Sublinear GMW-style compiler for MPC with preprocessing, in Annual International Cryptology Conference (2021), pp. 457–485
O. Catrina, A. Saxena, Secure computation with fixed-point numbers, in International Conference on Financial Cryptography and Data Security (2010), pp. 35–50
Chang, C., Melhem, R.: Arbitrary size benes networks. Parallel Processing Letters 07 (05), 279–284 (1997)
K. Cheng, T. Fan, Y. Jin, Y. Liu, T. Chen, Q. Yang, Secureboost: A lossless federated learning framework. arXiv:1901.08755 (2019)
Chida, K., Hamada, K., Ikarashi, D., Kikuchi, R., Kiribuchi, N., Pinkas, B.: An efficient secure three-party sorting protocol with an honest majority. IACR Cryptol. ePrint Arch. 2019, 695 (2019)
Cho, H., Wu, D.J., Berger, B.: Secure genome-wide association analysis using multiparty computation. Nature biotechnology 36(6), 547–551 (2018)
H. Corrigan-Gibbs, D. Boneh, Prio: Private, robust, and scalable computation of aggregate statistics, in A. Akella, J. Howell (eds.) 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27–29, 2017 (2017), pp. 259–282
R. Cramer, I. Damgård, D. Escudero, P. Scholl, C. Xing, SPD\(\mathbb{Z} _{2^k}\): Efficient mpc mod \(2^k\) for dishonest majority, in Advances in Cryptology – CRYPTO 2018, pp. 769–798
I. Damgård, V. Pastro, N. Smart, S. Zakarias, Multiparty computation from somewhat homomorphic encryption, in Annual Cryptology Conference (2012), pp. 643–662
D. Demmler, T. Schneider, M. Zohner, ABY - A framework for efficient mixed-protocol secure two-party computation, in 22nd Annual Network and Distributed System Security Symposium (NDSS, 2015)
D. Escudero, S. Ghosh, M. Keller, R. Rachuri, P. Scholl, Improved primitives for MPC over mixed arithmetic-binary circuits, in 40th Annual International Cryptology Conference, CRYPTO. Lecture Notes in Computer Science, vol. 12171 (2020), pp. 823–852
Z. Feng, H. Xiong, C. Song, S. Yang, B. Zhao, L. Wang, Z. Chen, S. Yang, L. Liu, J. Huan, Securegbm: Secure multi-party gradient boosting, in 2019 IEEE International Conference on Big Data (Big Data) (2019), pp. 1312–1321
J. Furukawa, Y. Lindell, A. Nof, O. Weinstein, High-throughput secure three-party computation for malicious adversaries and an honest majority, in J.S. Coron, J.B. Nielsen (eds.) Advances in Cryptology – EUROCRYPT 2017 (Cham, 2017), pp. 225–255
I. Giacomelli, J. Madsen, C. Orlandi, ZKBoo: Faster Zero-Knowledge for Boolean Circuits, in USENIX Security Symposium, vol. 16 (2016)
R. Gilad-Bachrach, N. Dowlin, K. Laine, K. Lauter, M. Naehrig, J. Wernsing, Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy, in International Conference on Machine Learning (2016), pp. 201–210
R.E. Goldschmidt, Applications of division by convergence. Ph.D. thesis, Massachusetts Institute of Technology (1964)
K. Hamada, R. Kikuchi, D. Ikarashi, K. Chida, K. Takahashi, Practically efficient multi-party sorting protocols from comparison sort algorithms, in International Conference on Information Security and Cryptology (2012), pp. 202–216
D. Harris, A taxonomy of parallel prefix networks, in The Thirty-Seventh Asilomar Conference on Signals, Systems & Computers, 2003, vol. 2 (2003), pp. 2213–2217
Y. Ishai, E. Kushilevitz, R. Ostrovsky, A. Sahai, Zero-knowledge from secure multiparty computation, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007 (2007), pp. 21–30
M. Jawurek, F. Kerschbaum, C. Orlandi, Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (2013), pp. 955–966
Jónsson, K.V., Kreitz, G., Uddin, M.: Secure multi-party sorting and applications. IACR Cryptol. ePrint Arch. 2011, 122 (2011)
C. Juvekar, V. Vaikuntanathan, A. Chandrakasan, GAZELLE: A low latency framework for secure neural network inference, in 27th USENIX Security Symposium (USENIX Security 18) (2018), pp. 1651–1669
M. Keller, MP-SPDZ: A versatile framework for multi-party computation, in CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security (2020), pp. 1575–1590
M. Keller, E. Orsini, P. Scholl, Actively secure OT extension with optimal overhead, in Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9215 (2015), pp. 724–741
M. Keller, E. Orsini, P. Scholl, MASCOT: faster malicious arithmetic secure computation with oblivious transfer, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016), pp. 830–842
M. Keller, V. Pastro, D. Rotaru, Overdrive: Making SPDZ great again, in EUROCRYPT 2018. Lecture Notes in Computer Science, vol. 10822 (2018), pp. 158–189
M. Keller, P. Scholl, N.P. Smart, .: An architecture for practical actively secure mpc with dishonest majority, in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), pp. 549–560
V. Kolesnikov, T. Schneider, T., Improved garbled circuit: Free XOR gates and applications, in International Colloquium on Automata, Languages, and Programming. Lecture Notes in Computer Science, vol. 5126 (2008), pp. 486–498
J. Liu, M. Juuti, Y. Lu, N. Asokan, Oblivious neural network predictions via minionn transformations, in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017), pp. 619–631
E. Makri, D. Rotaru, F. Vercauteren, S. Wagh, Rabbit: Efficient comparison for secure multi-party computation, in Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (2021), pp. 249–270
P. Mohassel, P. Rindal, ABY3: A mixed protocol framework for machine learning, in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), pp. 35–52
Mohassel, P., Rosulek, M., Trieu, N.: Practical privacy-preserving k-means clustering. Proceedings on Privacy Enhancing Technologies 2020(4), 414–433 (2020)
P. Mohassel, Y. Zhang, SecureML: A system for scalable privacy-preserving machine learning, in 2017 IEEE Symposium on Security and Privacy (SP) (2017), pp. 19–38
M. Naor, B. Pinkas, R. Sumner, Privacy preserving auctions and mechanism design, in S.I. Feldman, M.P. Wellman (eds.) Proceedings of the First ACM Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3–5, 1999 (1999), pp. 129–139
A. Patra, A. Suresh, BLAZE: blazing fast privacy-preserving machine learning, in 27th Annual Network and Distributed System Security Symposium (NDSS, 2020)
A. Patra, T. Schneider, A. Suresh, H. Yalame, ABY2. 0: Improved mixed-protocol secure two-party computation, in 30th USENIX Security Symposium (2021)
Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: Machine learning in Python. Journal of Machine Learning Research 12, 2825–2830 (2011)
P. Pullonen, S. Siim, Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations, in International Conference on Financial Cryptography and Data Security (2015), pp. 172–183
D. Rathee, A. Bhattacharya, R. Sharma, D. Gupta, N. Chandran, A. Rastogi, Secfloat: Accurate floating-point meets secure 2-party computation, in 2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 576–595
D. Rathee, M. Rathee, R.K.K. Goli, D. Gupta, R. Sharma, N. Chandran, A. Rastogi, Sirnn: A math library for secure RNN inference, in 2021 IEEE Symposium on Security and Privacy (SP) (2021), pp. 1003–1020
M.S. Riazi, C. Weinert, O. Tkachenko, E.M. Songhori, T. Schneider, F. Koushanfar, Chameleon: A hybrid secure computation framework for machine learning applications, in Proceedings of the 2018 on Asia Conference on Computer and Communications Security (2018), pp. 707–721
D. Rotaru, T. Wood, Marbled circuits: Mixing arithmetic and Boolean circuits with active security, in Progress in Cryptology–INDOCRYPT 2019: 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings (2019), pp. 227–249
Wagh, S., Gupta, D., Chandran, N.: SecureNN: 3-party secure computation for neural network training. Proceedings on Privacy Enhancing Technologies 2019(3), 26–49 (2019)
Waksman, A.: A permutation network. Journal of the ACM 15:159–163 (1968)
A. Yao, How to generate and exchange secrets (extended abstract), in 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986 (1986), pp. 162–167
S. Zahur, M. Rosulek, D. Evans, Two halves make a whole, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (2015), pp. 220–250
W. Zheng, R. Deng, W. Chen, R.A. Popa, A, Panda, I. Stoica, Cerebro: A platform for multi-party cryptographic collaborative learning, in 30th USENIX Security Symposium (2021)
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by David Pointcheval and Nigel Smart.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
N. Gama, I. Leontiadis, M. Mohammadi: This work was done while the author was working for Inpher.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Belorgey, M.G., Carpov, S., Deforth, K. et al. Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic. J Cryptol 36, 31 (2023). https://doi.org/10.1007/s00145-023-09464-4
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00145-023-09464-4