Paper 2009/614

Secure Multiparty AES (full paper)

Ivan Damgård and Marcel Keller

Abstract

We propose several variants of a secure multiparty computation protocol for AES encryption. The best variant requires $2200 + \frac{400}{255}$ expected elementary operations in expected $70 + \frac{20}{255}$ rounds to encrypt one 128-bit block with a 128-bit key. We implemented the variants using VIFF, a software framework for implementing secure multiparty computation (MPC). Tests with three players (passive security against at most one corrupted player) in a local network showed that one block can be encrypted in 2 seconds. We also argue that this result could be improved by an optimized implementation. The security requirements are the same as for the underlying MPC scheme.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. A short version will appear in the proceedings of Financial Crypto '10.
Keywords
multiparty computationAES
Contact author(s)
mkeller @ cs au dk
History
2009-12-14: received
Short URL
https://ia.cr/2009/614
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/614,
      author = {Ivan Damgård and Marcel Keller},
      title = {Secure Multiparty AES (full paper)},
      howpublished = {Cryptology ePrint Archive, Paper 2009/614},
      year = {2009},
      note = {\url{https://eprint.iacr.org/2009/614}},
      url = {https://eprint.iacr.org/2009/614}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.