Modes of Operation Suitable for Computing on Encrypted Data
We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do n...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2017-09-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/775 |
_version_ | 1819179593543712768 |
---|---|
author | Dragos Rotaru Nigel P. Smart Martijn Stam |
author_facet | Dragos Rotaru Nigel P. Smart Martijn Stam |
author_sort | Dragos Rotaru |
collection | DOAJ |
description | We examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field. The latter fitting the use case of many secret-sharing based MPC engines. In doing this conversion we examine the associated security proofs of PMAC and OTR, and show that they carry over to this new setting. |
first_indexed | 2024-12-22T22:00:55Z |
format | Article |
id | doaj.art-25e4b48a8c4a426c94701f2823707272 |
institution | Directory Open Access Journal |
issn | 2519-173X |
language | English |
last_indexed | 2024-12-22T22:00:55Z |
publishDate | 2017-09-01 |
publisher | Ruhr-Universität Bochum |
record_format | Article |
series | IACR Transactions on Symmetric Cryptology |
spelling | doaj.art-25e4b48a8c4a426c94701f28237072722022-12-21T18:11:07ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2017-09-0129432410.13154/tosc.v2017.i3.294-324775Modes of Operation Suitable for Computing on Encrypted DataDragos Rotaru0Nigel P. Smart1Martijn Stam2University of BristolUniversity of BristolUniversity of BristolWe examine how two parallel modes of operation for Authenticated Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field. The latter fitting the use case of many secret-sharing based MPC engines. In doing this conversion we examine the associated security proofs of PMAC and OTR, and show that they carry over to this new setting.https://tosc.iacr.org/index.php/ToSC/article/view/775Modes-of-OperationMulti-Party Computation |
spellingShingle | Dragos Rotaru Nigel P. Smart Martijn Stam Modes of Operation Suitable for Computing on Encrypted Data IACR Transactions on Symmetric Cryptology Modes-of-Operation Multi-Party Computation |
title | Modes of Operation Suitable for Computing on Encrypted Data |
title_full | Modes of Operation Suitable for Computing on Encrypted Data |
title_fullStr | Modes of Operation Suitable for Computing on Encrypted Data |
title_full_unstemmed | Modes of Operation Suitable for Computing on Encrypted Data |
title_short | Modes of Operation Suitable for Computing on Encrypted Data |
title_sort | modes of operation suitable for computing on encrypted data |
topic | Modes-of-Operation Multi-Party Computation |
url | https://tosc.iacr.org/index.php/ToSC/article/view/775 |
work_keys_str_mv | AT dragosrotaru modesofoperationsuitableforcomputingonencrypteddata AT nigelpsmart modesofoperationsuitableforcomputingonencrypteddata AT martijnstam modesofoperationsuitableforcomputingonencrypteddata |