Modes of Operation Suitable for Computing on Encrypted Data

We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do n...

Full description

Bibliographic Details
Main Authors: Dragos Rotaru, Nigel P. Smart, Martijn Stam
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2017-09-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/775
_version_ 1819179593543712768
author Dragos Rotaru
Nigel P. Smart
Martijn Stam
author_facet Dragos Rotaru
Nigel P. Smart
Martijn Stam
author_sort Dragos Rotaru
collection DOAJ
description We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field. The latter fitting the use case of many secret-sharing based MPC engines. In doing this conversion we examine the associated security proofs of PMAC and OTR, and show that they carry over to this new setting.
first_indexed 2024-12-22T22:00:55Z
format Article
id doaj.art-25e4b48a8c4a426c94701f2823707272
institution Directory Open Access Journal
issn 2519-173X
language English
last_indexed 2024-12-22T22:00:55Z
publishDate 2017-09-01
publisher Ruhr-Universität Bochum
record_format Article
series IACR Transactions on Symmetric Cryptology
spelling doaj.art-25e4b48a8c4a426c94701f28237072722022-12-21T18:11:07ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2017-09-0129432410.13154/tosc.v2017.i3.294-324775Modes of Operation Suitable for Computing on Encrypted DataDragos Rotaru0Nigel P. Smart1Martijn Stam2University of BristolUniversity of BristolUniversity of BristolWe examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field. The latter fitting the use case of many secret-sharing based MPC engines. In doing this conversion we examine the associated security proofs of PMAC and OTR, and show that they carry over to this new setting.https://tosc.iacr.org/index.php/ToSC/article/view/775Modes-of-OperationMulti-Party Computation
spellingShingle Dragos Rotaru
Nigel P. Smart
Martijn Stam
Modes of Operation Suitable for Computing on Encrypted Data
IACR Transactions on Symmetric Cryptology
Modes-of-Operation
Multi-Party Computation
title Modes of Operation Suitable for Computing on Encrypted Data
title_full Modes of Operation Suitable for Computing on Encrypted Data
title_fullStr Modes of Operation Suitable for Computing on Encrypted Data
title_full_unstemmed Modes of Operation Suitable for Computing on Encrypted Data
title_short Modes of Operation Suitable for Computing on Encrypted Data
title_sort modes of operation suitable for computing on encrypted data
topic Modes-of-Operation
Multi-Party Computation
url https://tosc.iacr.org/index.php/ToSC/article/view/775
work_keys_str_mv AT dragosrotaru modesofoperationsuitableforcomputingonencrypteddata
AT nigelpsmart modesofoperationsuitableforcomputingonencrypteddata
AT martijnstam modesofoperationsuitableforcomputingonencrypteddata