Fast and Maliciously Secure Two-Party Computation Using the GPU

Provided by: Aarhus University
Topic: Security
Format: PDF
The authors describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. The protocol is based on cut-and-choose of Yao's garbled circuit and an efficient oblivious transfer extension. The implementation is done using CUDA and yields fast results in a financially feasible and practical setting by using a consumer grade CPU and GPU. Their protocol introduces a novel construction in order to verify consistency of the garbled circuit constructor's input in a parallel and maliciously secure setting.

Find By Topic