Experimental browser for the Atmosphere
Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations (Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl) ia.cr/2025/789
May 5, 2025, 2:03 AM
{ "uri": "at://did:plc:fwa55bujvdrwlwlwgqmmxmuf/app.bsky.feed.post/3lofbonvif626", "cid": "bafyreierkwrprhh42w4mvfw772ki2exc4oinybizf7cgc56lc6c7n25qt4", "value": { "text": "Rushing at SPDZ: On the Practical Security of Malicious MPC Implementations (Alexander Kyster, Frederik Huss Nielsen, Sabine Oechsner, Peter Scholl) ia.cr/2025/789", "$type": "app.bsky.feed.post", "embed": { "$type": "app.bsky.embed.images", "images": [ { "alt": "Abstract. Secure multi-party computation (MPC) enables parties to compute a function over private inputs while maintaining confidentiality. Although MPC has advanced significantly and attracts a growing industry interest, open-source implementations are still at an early stage, with no production-ready code and a poor understanding of their actual security guarantees. In this work, we study the real-world security of modern MPC implementations, focusing on the SPDZ protocol (Damgård et al., CRYPTO 2012, ESORICS 2013), which provides security against malicious adversaries when all-but-one of the participants may be corrupted. We identify a novel type of MAC key leakage in the MAC check protocol of SPDZ, which can be exploited in concurrent, multi-threaded settings, compromising output integrity and, in some cases, input privacy. In our analysis of three SPDZ implementations (MP-SPDZ, SCALE-MAMBA, and FRESCO), two are vulnerable to this attack, while we also uncover further issues and vulnerabilities with all implementations. We propose mitigation strategies and some recommendations for researchers, developers and users, which we hope can bring more awareness to these issues and avoid them reoccurring in future.\n", "image": { "$type": "blob", "ref": { "$link": "bafkreifpgk755nprljthas3j3fwxqwpzlbutaaltubexgqtsanhgz2at3e" }, "mimeType": "image/png", "size": 107427 }, "aspectRatio": { "width": 1200, "height": 800 } }, { "alt": "Image showing part 2 of abstract.", "image": { "$type": "blob", "ref": { "$link": "bafkreiekld3k6r5quzoywfjppijedpimi7sztig7cuheiopodfhba4zbt4" }, "mimeType": "image/png", "size": 15407 }, "aspectRatio": { "width": 1200, "height": 800 } } ] }, "facets": [ { "index": { "byteEnd": 133, "byteStart": 118 }, "features": [ { "did": "did:plc:bhvid7cxsz5maps5dw4367x6", "$type": "app.bsky.richtext.facet#mention" } ] }, { "index": { "byteEnd": 163, "byteStart": 149 }, "features": [ { "uri": "https://ia.cr/2025/789", "$type": "app.bsky.richtext.facet#link" } ] } ], "createdAt": "2025-05-05T02:03:27.148251Z" } }