Experimental browser for the Atmosphere
Robust and Verifiable MPC with Applications to Linear Machine Learning Inference (Tzu-Shen Wang, Jimmy Dani, Juan Garay, Soamar Homsi, Nitesh Saxena) ia.cr/2025/786
May 4, 2025, 3:17 PM
{ "uri": "at://did:plc:fwa55bujvdrwlwlwgqmmxmuf/app.bsky.feed.post/3loe5lmczuv2l", "cid": "bafyreifpgxh2mqn3kku5d3rtl6vr6ejh4yfgzf2mnwvixotkehrfgoa3nm", "value": { "text": "Robust and Verifiable MPC with Applications to Linear Machine Learning Inference (Tzu-Shen Wang, Jimmy Dani, Juan Garay, Soamar Homsi, Nitesh Saxena) ia.cr/2025/786", "$type": "app.bsky.feed.post", "embed": { "$type": "app.bsky.embed.images", "images": [ { "alt": "Abstract. In this work, we present an efficient secure multi-party computation MPC protocol that provides strong security guarantees in settings with a dishonest majority of participants who may behave arbitrarily. Unlike the popular MPC implementation known as SPDZ [Crypto ’12], which only ensures security with abort, our protocol achieves both complete identifiability and robustness. With complete identifiability, honest parties can detect and unanimously agree on the identity of any malicious party. Robustness allows the protocol to continue with the computation without requiring a restart, even when malicious behavior is detected. Additionally, our approach addresses the performance limitations observed in the protocol by Cunningham et al. [ICITS ’17], which, while achieving complete identifiability, is hindered by the costly exponentiation operations required by the choice of commitment scheme.\n\nOur protocol is based on the approach by Rivinius et al. [S&P ’22], utilizing lattice-based commitment for better efficiency. We achieves robustness with the help of a semi-honest trusted third party. We benchmark our robust protocol, showing the efficient recovery from parties’ malicious behavior.\n\nFinally, we benchmark our protocol on a ML-as-a-service scenario, wherein clients off-load the desired computation to the servers, and verify the computation result. We benchmark on linear ML inference, running on various datasets. While our efficiency is slightly lower compared to SPDZ’s, we offer stronger security properties that provide distinct advantages.\n", "image": { "$type": "blob", "ref": { "$link": "bafkreia5cthgwtvipdquqeotpicmbslgyjqpxk4k6oqfi42uqpyva6wqee" }, "mimeType": "image/png", "size": 100203 }, "aspectRatio": { "width": 1200, "height": 800 } }, { "alt": "Image showing part 2 of abstract.", "image": { "$type": "blob", "ref": { "$link": "bafkreiegmcsbv2eql4bky3rkoysc5f5yzciv7rav2npcte6fb4nyveqa6q" }, "mimeType": "image/png", "size": 53025 }, "aspectRatio": { "width": 1200, "height": 800 } } ] }, "facets": [ { "index": { "byteEnd": 164, "byteStart": 150 }, "features": [ { "uri": "https://ia.cr/2025/786", "$type": "app.bsky.richtext.facet#link" } ] } ], "createdAt": "2025-05-04T15:17:46.027555Z" } }