Skip to main content
Log in

Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic

  • Research Article
  • Published:
Journal of Cryptology Aims and scope Submit manuscript

Abstract

We propose a novel framework, \(\texttt{Manticore}\), for multiparty computations, with full threshold and semi-honest security model, supporting a combination of real number arithmetic (arithmetic shares), Boolean arithmetic (Boolean shares) and garbled circuits (Yao shares). In contrast to prior work (Mohassel and Zhang, in 2017 IEEE symposium on security and privacy (SP), 2017; Mohassel and Rindal, in Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, 2018), \(\texttt{Manticore}\) mitigates overflows, which is of paramount importance for machine learning applications, without compromising efficiency or security. Compared to other overflow-free recent techniques such as MP-SPDZ (Escudero et al., in 40th annual international cryptology conference, CRYPTO. Lecture notes in computer science, 2020) that convert arithmetic to Boolean shares, \(\texttt{Manticore}\) uses an efficient modular lifting/truncation method that allows for scalable high numerical precision computations with optimal numerical windows and hence, highly efficient online phases. We adapt basic MPC operations such as real-valued polynomial evaluation, division, logarithms, exponentials, Fourier series evaluations and oblivious comparisons to \(\texttt{Manticore}\) by employing our modular lift in combination with existing efficient conversions between arithmetic, Boolean and Yao shares. We also describe a highly scalable computations of logistic regression models with real-world training data sizes and high numerical precision through PCA and blockwise variants (for memory and runtime optimizations) based on second-order optimization techniques. On a dataset of 50 M samples and 50 features distributed among two players, the online phase completes in 14.5 h with at least 10 decimal digits of precision compared to plaintext training. The setup phase of \(\texttt{Manticore}\) is supported in both the trusted dealer and the interactive models allowing for tradeoffs between efficiency and stronger security. The highly efficient online phase makes the framework particularly suitable for MPC applications where the output of the setup phase is part of the input of the protocol (such as MPC-in-the-head or Prio).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. https://github.com/KULeuven-COSIC/SCALE-MAMBA.

  2. http://www.humangenomeprivacy.org/2020/.

  3. A scheme is called t-out-of-n threshold secret sharing scheme if fulfil the requirements: any subset of t or more of the parties can reconstruct the secret, yet no subset of \(t-1\) fewer parties can learn anything about the secret.

  4. \(\mathcal {M}_{M,\ell }\) can be viewed as \(\sum _{i=\ell }^{M-1} m_i2^i \mod 2^{M}, \quad \text {for} \quad m_i \in \{0,1\}\).

  5. The choice of 58 above in order to resemble the plaintext of type \(\texttt {float64}\), whereby the mantissa is 53 bits.

  6. A set of vectors is orthonormal if every vector in the set has norm 1 and the set of vectors are mutually orthogonal.

  7. https://scikit-learn.org.

  8. https://github.com/data61/MP-SPDZ.

  9. This is done in two steps: (1) Player i locally computes \(\pi _i(a_i)\) and updates its share of y to \(\pi _i(a_i)\) minus its share of \(\pi _i(\lambda _i)\); (2) Everyone else updates its share of y to the negative of its share of \(\pi _i( \lambda _i )\).

  10. https://tls.mbed.org.

References

  1. M. Al-Rubaie, P.Y. Wu, J.M. Chang, S.Y. Kung, Privacy-preserving PCA on horizontally-partitioned data, in 2017 IEEE Conference on Dependable and Secure Computing (2017), pp. 280–287

  2. M. Aliasgari, M. Blanton, Y. Zhang, A. Steele, Secure computation on floating point numbers, in NDSS (2013)

  3. A. Aly, N.P. Smart, Benchmarking privacy preserving scientific operations, in International Conference on Applied Cryptography and Network Security (2019), pp 509–529

  4. T. Araki, J. Furukawa, Y. Lindell, A. Nof, K. Ohara, High-throughput semi-honest secure three-party computation with an honest majority, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16 (2016), pp. 805–817

  5. Aumüller, M., Dietzfelbinger, M., Klaue, P.: How good is multi-pivot quicksort? ACM Transactions on Algorithms (TALG) 13(1), 1–47 (2016)

    MathSciNet  MATH  Google Scholar 

  6. D. Beaver, Efficient multiparty protocols using circuit randomization, in CRYPTO ’91. Lecture Notes in Computer Science, vol. 576 (1992), pp. 420–432

  7. D. Beaver, S. Micali, P. Rogaway, The round complexity of secure protocols (extended abstract), in Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, May 13–17, 1990, Baltimore, Maryland, USA (1990), pp. 503–513

  8. D. Bogdanov, S. Laur, J. Willemson, Sharemind: A framework for fast privacy-preserving computations, in European Symposium on Research in Computer Security (2008), pp. 192–206

  9. D. Bogdanov, P. Laud, J. Randmets, Domain-polymorphic language for privacy-preserving applications, in Proceedings of the First ACM Workshop on Language Support for Privacy-Enhancing Technologies (2013), pp. 23–26

  10. D. Bogdanov, R. Talviste, J. Willemson, Deploying secure multi-party computation for financial data analysis, in International Conference on Financial Cryptography and Data Security (2012), pp. 57–64

  11. C. Boura, I. Chillotti, N. Gama, D. Jetchev, S. Peceny, A. Petric, High-precision privacy-preserving real-valued function evaluation, in International Conference on Financial Cryptography and Data Security (2018), pp. 183–202

  12. E. Boyle, N. Gilboa, Y. Ishai, A. Nof, Sublinear GMW-style compiler for MPC with preprocessing, in Annual International Cryptology Conference (2021), pp. 457–485

  13. O. Catrina, A. Saxena, Secure computation with fixed-point numbers, in International Conference on Financial Cryptography and Data Security (2010), pp. 35–50

  14. Chang, C., Melhem, R.: Arbitrary size benes networks. Parallel Processing Letters 07 (05), 279–284 (1997)

    Article  Google Scholar 

  15. K. Cheng, T. Fan, Y. Jin, Y. Liu, T. Chen, Q. Yang, Secureboost: A lossless federated learning framework. arXiv:1901.08755 (2019)

  16. Chida, K., Hamada, K., Ikarashi, D., Kikuchi, R., Kiribuchi, N., Pinkas, B.: An efficient secure three-party sorting protocol with an honest majority. IACR Cryptol. ePrint Arch. 2019,  695 (2019)

    Google Scholar 

  17. Cho, H., Wu, D.J., Berger, B.: Secure genome-wide association analysis using multiparty computation. Nature biotechnology 36(6), 547–551 (2018)

    Article  Google Scholar 

  18. H. Corrigan-Gibbs, D. Boneh, Prio: Private, robust, and scalable computation of aggregate statistics, in A. Akella, J. Howell (eds.) 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, Boston, MA, USA, March 27–29, 2017 (2017), pp. 259–282

  19. R. Cramer, I. Damgård, D. Escudero, P. Scholl, C. Xing, SPD\(\mathbb{Z} _{2^k}\): Efficient mpc mod \(2^k\) for dishonest majority, in Advances in Cryptology – CRYPTO 2018, pp. 769–798

  20. I. Damgård, V. Pastro, N. Smart, S. Zakarias, Multiparty computation from somewhat homomorphic encryption, in Annual Cryptology Conference (2012), pp. 643–662

  21. D. Demmler, T. Schneider, M. Zohner, ABY - A framework for efficient mixed-protocol secure two-party computation, in 22nd Annual Network and Distributed System Security Symposium (NDSS, 2015)

  22. D. Escudero, S. Ghosh, M. Keller, R. Rachuri, P. Scholl, Improved primitives for MPC over mixed arithmetic-binary circuits, in 40th Annual International Cryptology Conference, CRYPTO. Lecture Notes in Computer Science, vol. 12171 (2020), pp. 823–852

  23. Z. Feng, H. Xiong, C. Song, S. Yang, B. Zhao, L. Wang, Z. Chen, S. Yang, L. Liu, J. Huan, Securegbm: Secure multi-party gradient boosting, in 2019 IEEE International Conference on Big Data (Big Data) (2019), pp. 1312–1321

  24. J. Furukawa, Y. Lindell, A. Nof, O. Weinstein, High-throughput secure three-party computation for malicious adversaries and an honest majority, in J.S. Coron, J.B. Nielsen (eds.) Advances in Cryptology – EUROCRYPT 2017 (Cham, 2017), pp. 225–255

  25. I. Giacomelli, J. Madsen, C. Orlandi, ZKBoo: Faster Zero-Knowledge for Boolean Circuits, in USENIX Security Symposium, vol. 16 (2016)

  26. R. Gilad-Bachrach, N. Dowlin, K. Laine, K. Lauter, M. Naehrig, J. Wernsing, Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy, in International Conference on Machine Learning (2016), pp. 201–210

  27. R.E. Goldschmidt, Applications of division by convergence. Ph.D. thesis, Massachusetts Institute of Technology (1964)

  28. K. Hamada, R. Kikuchi, D. Ikarashi, K. Chida, K. Takahashi, Practically efficient multi-party sorting protocols from comparison sort algorithms, in International Conference on Information Security and Cryptology (2012), pp. 202–216

  29. D. Harris, A taxonomy of parallel prefix networks, in The Thirty-Seventh Asilomar Conference on Signals, Systems & Computers, 2003, vol. 2 (2003), pp. 2213–2217

  30. Y. Ishai, E. Kushilevitz, R. Ostrovsky, A. Sahai, Zero-knowledge from secure multiparty computation, in Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007 (2007), pp. 21–30

  31. M. Jawurek, F. Kerschbaum, C. Orlandi, Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently, in Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (2013), pp. 955–966

  32. Jónsson, K.V., Kreitz, G., Uddin, M.: Secure multi-party sorting and applications. IACR Cryptol. ePrint Arch. 2011,  122 (2011)

    Google Scholar 

  33. C. Juvekar, V. Vaikuntanathan, A. Chandrakasan, GAZELLE: A low latency framework for secure neural network inference, in 27th USENIX Security Symposium (USENIX Security 18) (2018), pp. 1651–1669

  34. M. Keller, MP-SPDZ: A versatile framework for multi-party computation, in CCS ’20: 2020 ACM SIGSAC Conference on Computer and Communications Security (2020), pp. 1575–1590

  35. M. Keller, E. Orsini, P. Scholl, Actively secure OT extension with optimal overhead, in Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9215 (2015), pp. 724–741

  36. M. Keller, E. Orsini, P. Scholl, MASCOT: faster malicious arithmetic secure computation with oblivious transfer, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016), pp. 830–842

  37. M. Keller, V. Pastro, D. Rotaru, Overdrive: Making SPDZ great again, in EUROCRYPT 2018. Lecture Notes in Computer Science, vol. 10822 (2018), pp. 158–189

  38. M. Keller, P. Scholl, N.P. Smart, .: An architecture for practical actively secure mpc with dishonest majority, in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), pp. 549–560

  39. V. Kolesnikov, T. Schneider, T., Improved garbled circuit: Free XOR gates and applications, in International Colloquium on Automata, Languages, and Programming. Lecture Notes in Computer Science, vol. 5126 (2008), pp. 486–498

  40. J. Liu, M. Juuti, Y. Lu, N. Asokan, Oblivious neural network predictions via minionn transformations, in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017), pp. 619–631

  41. E. Makri, D. Rotaru, F. Vercauteren, S. Wagh, Rabbit: Efficient comparison for secure multi-party computation, in Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I (2021), pp. 249–270

  42. P. Mohassel, P. Rindal, ABY3: A mixed protocol framework for machine learning, in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), pp. 35–52

  43. Mohassel, P., Rosulek, M., Trieu, N.: Practical privacy-preserving k-means clustering. Proceedings on Privacy Enhancing Technologies 2020(4), 414–433 (2020)

    Article  Google Scholar 

  44. P. Mohassel, Y. Zhang, SecureML: A system for scalable privacy-preserving machine learning, in 2017 IEEE Symposium on Security and Privacy (SP) (2017), pp. 19–38

  45. M. Naor, B. Pinkas, R. Sumner, Privacy preserving auctions and mechanism design, in S.I. Feldman, M.P. Wellman (eds.) Proceedings of the First ACM Conference on Electronic Commerce (EC-99), Denver, CO, USA, November 3–5, 1999 (1999), pp. 129–139

  46. A. Patra, A. Suresh, BLAZE: blazing fast privacy-preserving machine learning, in 27th Annual Network and Distributed System Security Symposium (NDSS, 2020)

  47. A. Patra, T. Schneider, A. Suresh, H. Yalame, ABY2. 0: Improved mixed-protocol secure two-party computation, in 30th USENIX Security Symposium (2021)

  48. Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: Machine learning in Python. Journal of Machine Learning Research 12, 2825–2830 (2011)

    MathSciNet  MATH  Google Scholar 

  49. P. Pullonen, S. Siim, Combining secret sharing and garbled circuits for efficient private IEEE 754 floating-point computations, in International Conference on Financial Cryptography and Data Security (2015), pp. 172–183

  50. D. Rathee, A. Bhattacharya, R. Sharma, D. Gupta, N. Chandran, A. Rastogi, Secfloat: Accurate floating-point meets secure 2-party computation, in 2022 IEEE Symposium on Security and Privacy (SP) (2022), pp. 576–595

  51. D. Rathee, M. Rathee, R.K.K. Goli, D. Gupta, R. Sharma, N. Chandran, A. Rastogi, Sirnn: A math library for secure RNN inference, in 2021 IEEE Symposium on Security and Privacy (SP) (2021), pp. 1003–1020

  52. M.S. Riazi, C. Weinert, O. Tkachenko, E.M. Songhori, T. Schneider, F. Koushanfar, Chameleon: A hybrid secure computation framework for machine learning applications, in Proceedings of the 2018 on Asia Conference on Computer and Communications Security (2018), pp. 707–721

  53. D. Rotaru, T. Wood, Marbled circuits: Mixing arithmetic and Boolean circuits with active security, in Progress in Cryptology–INDOCRYPT 2019: 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings (2019), pp. 227–249

  54. Wagh, S., Gupta, D., Chandran, N.: SecureNN: 3-party secure computation for neural network training. Proceedings on Privacy Enhancing Technologies 2019(3), 26–49 (2019)

    Article  Google Scholar 

  55. Waksman, A.: A permutation network. Journal of the ACM 15:159–163 (1968)

    Article  MathSciNet  MATH  Google Scholar 

  56. A. Yao, How to generate and exchange secrets (extended abstract), in 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986 (1986), pp. 162–167

  57. S. Zahur, M. Rosulek, D. Evans, Two halves make a whole, in Annual International Conference on the Theory and Applications of Cryptographic Techniques (2015), pp. 220–250

  58. W. Zheng, R. Deng, W. Chen, R.A. Popa, A, Panda, I. Stoica, Cerebro: A platform for multi-party cryptographic collaborative learning, in 30th USENIX Security Symposium (2021)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariya Georgieva Belorgey.

Additional information

Communicated by David Pointcheval and Nigel Smart.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

N. Gama, I. Leontiadis, M. Mohammadi: This work was done while the author was working for Inpher.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Belorgey, M.G., Carpov, S., Deforth, K. et al. Manticore: A Framework for Efficient Multiparty Computation Supporting Real Number and Boolean Arithmetic. J Cryptol 36, 31 (2023). https://doi.org/10.1007/s00145-023-09464-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s00145-023-09464-4

Navigation