论文标题
具有对抗性节点的大规模矩阵编码的安全多方计算
Coded Secure Multi-Party Computation for Massive Matrices with Adversarial Nodes
论文作者
论文摘要
在这项工作中,我们考虑了由$γ$源组成的安全多方计算(MPC)的问题,每个人都可以访问大型私人矩阵,$ n $处理节点或工人,以及一个数据收集器或大师。主对输入矩阵的多项式函数的结果感兴趣。每个源将其矩阵的随机函数(称为其份额)发送给每个工人。工人对彼此的互动进行处理,并向主人发送一些结果,以便可以得出最终结果。有几个约束:(1)每个工人可以存储每个输入矩阵的函数,其大小为$ \ frac {1} {m} $的分数,((2)最多可用于工人的工人的$ t $,对于某些integer $ t $而言,可能是对手,并且可能是对私人输入的信息,或可以碰到有关私人式的操作,以使得Maliouse confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort confort。目的是设计一个MPC方案,其中最小工人称为恢复阈值,以使最终结果是正确的,工人不学习有关输入矩阵的信息,而主人除了最终结果外什么都没有学习。在本文中,我们提出了一个MPC方案,该方案可实现$ 3T+2M-1 $工人的恢复阈值,该阈值的订单低于常规方法的恢复阈值。处理此设置的挑战在于,当节点相互交互时,对抗性节点会在系统中传播的恶意消息,并可能误导诚实的节点。为了应对这一挑战,我们设计了一些可以检测错误消息并纠正或删除的子例程。
In this work, we consider the problem of secure multi-party computation (MPC), consisting of $Γ$ sources, each has access to a large private matrix, $N$ processing nodes or workers, and one data collector or master. The master is interested in the result of a polynomial function of the input matrices. Each source sends a randomized functions of its matrix, called as its share, to each worker. The workers process their shares in interaction with each other, and send some results to the master such that it can derive the final result. There are several constraints: (1) each worker can store a function of each input matrix, with the size of $\frac{1}{m}$ fraction of that input matrix, (2) up to $t$ of the workers, for some integer $t$, are adversary and may collude to gain information about the private inputs or can do malicious actions to make the final result incorrect. The objective is to design an MPC scheme with the minimum number the workers, called the recovery threshold, such that the final result is correct, workers learn no information about the input matrices, and the master learns nothing beyond the final result. In this paper, we propose an MPC scheme that achieves the recovery threshold of $3t+2m-1$ workers, which is order-wise less than the recovery threshold of the conventional methods. The challenge in dealing with this set up is that when nodes interact with each other, the malicious messages that adversarial nodes generate propagate through the system, and can mislead the honest nodes. To deal with this challenge, we design some subroutines that can detect erroneous messages, and correct or drop them.