Modes of Operation Suitable for Computing on Encrypted Data
Autor: | Rotaru, Dragos, Smart, Nigel P., Stam, Martijn |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2017 |
Předmět: |
021110 strategic
defence & security studies lcsh:Computer engineering. Computer hardware Modes-of-Operation Applied Mathematics Multi-Party Computation 0211 other engineering and technologies lcsh:TK7885-7895 02 engineering and technology Computer Science Applications Computational Mathematics 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Software |
Zdroj: | IACR Transactions on Symmetric Cryptology, Pp 294-324 (2017) IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 3; 294-324 Transactions on Symmetric Cryptology |
ISSN: | 2519-173X |
Popis: | We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field. The latter fitting the use case of many secret-sharing based MPC engines. In doing this conversion we examine the associated security proofs of PMAC and OTR, and show that they carry over to this new setting. IACR Transactions on Symmetric Cryptology, Volume 2017, Issue 3 |
Databáze: | OpenAIRE |
Externí odkaz: |