Modes of Operation Suitable for Computing on Encrypted Data

Dragos Rotaru, Nigel Smart, Martijn Stam

Research output: Contribution to journalArticle (Academic Journal)peer-review

Abstract

We examine how two parallel modes of operation for Authenticated
Encryption (namely CTR+PMAC and OTR mode) work when evaluated in a multiparty computation engine. These two modes are selected because they suit the PRFs examined in previous works. In particular the modes are highly parallel, and do not require evaluation of the inverse of the underlying PRF. In order to use these modes one needs to convert them from their original instantiation of being defined on binary blocks of data, to working on elememts in a large prime finite field. The latter fitting the use case of many secret-sharing based MPC engines. In doing this conversion we examine the associated security proofs of PMAC and OTR, and show that they carry over to this new setting.
Original languageEnglish
Pages (from-to)294-324
Number of pages31
JournalTransactions on Symmetric Cryptology
Volume2017
Issue number3
DOIs
Publication statusPublished - 1 Aug 2017

Keywords

  • Modes-of-operation
  • Multi-party computation

Fingerprint Dive into the research topics of 'Modes of Operation Suitable for Computing on Encrypted Data'. Together they form a unique fingerprint.

Cite this