Cryptalphabet Soup: DPFs meet MPC and ZKPs
dc.contributor.advisor | Henry, Ryan | |
dc.contributor.author | Storrier, Kyle | |
dc.contributor.committeemember | Aycock, John | |
dc.contributor.committeemember | Reardon, Joel | |
dc.contributor.committeemember | Henry, Ryan | |
dc.date | 2023-11 | |
dc.date.accessioned | 2023-10-02T16:58:13Z | |
dc.date.available | 2023-10-02T16:58:13Z | |
dc.date.issued | 2023-09-22 | |
dc.description.abstract | Secure multiparty computation (MPC) protocols enable multiple parties to collaborate on a computation using private inputs possessed by the different parties in the computation. At the same time, MPC protocols ensure that no participating party learns anything about the other parties’ private inputs beyond what they can infer from the computation’s output and their own inputs. MPC has wide ranging applications for privacy protecting systems. However, these systems have been plagued by limited performance, lack of scalability, and poor accuracy. In this thesis, we demonstrate several novel techniques for using distributed point functions (DPFs) in combination with MPC to obtain significant performance improvements in several different applications. Namely, using novel observations about the structure of the most efficient available DPF construction in the literature, we show that DPF keys from untrusted sources can be checked for correctness using an MPC protocol between the two key holders, with direct applications in sender-anonymous messaging. We expand these observations to produce the most efficient available method to evaluate piecewise-polynomial functions, also known as splines. The scalability and efficiency of this method allows for splines to be used for extremely high accuracy approximation of non-linear functions in MPC. Furthermore, the protocols proposed in this thesis far outperform prior solutions both in large-scale asymptotic measurements and in concrete benchmarks using high-performance software implementations at both small- and large-scale. | |
dc.identifier.citation | Storrier, K. (2023). Cryptalphabet soup: DPFs meet MPC and ZKPs (Master's thesis, University of Calgary, Calgary, Canada). Retrieved from https://prism.ucalgary.ca. | |
dc.identifier.uri | https://hdl.handle.net/1880/117318 | |
dc.language.iso | en | |
dc.publisher.faculty | Science | |
dc.publisher.institution | University of Calgary | |
dc.rights | University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. | |
dc.subject | Cryptography | |
dc.subject | Secure Multiparty Computation | |
dc.subject | MPC | |
dc.subject | Zero-Knowledge Proof | |
dc.subject | ZKP | |
dc.subject | Distributed Point Function | |
dc.subject | DPF | |
dc.subject | Function Secret Sharing | |
dc.subject | FSS | |
dc.subject | Private Information Retrieval | |
dc.subject | PIR | |
dc.subject | Sender-Anonymous Messaging | |
dc.subject | Privacy-Enhancing Technology | |
dc.subject | Privacy Preserving Machine Learning | |
dc.subject.classification | Computer Science | |
dc.title | Cryptalphabet Soup: DPFs meet MPC and ZKPs | |
dc.type | master thesis | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | University of Calgary | |
thesis.degree.name | Master of Science (MSc) | |
ucalgary.thesis.accesssetbystudent | I do not require a thesis withhold – my thesis will have open access and can be viewed and downloaded publicly as soon as possible. |