Hi Jonas,
We recently published a paper on this at the RSA Conference:
Damiano Abram,
Ivan Damgård,
Peter Scholl,
Sven Trieflinger:
Oblivious TLS via Multi-party Computation.
CT-RSA 2021: 51-74
The paper also contains some preliminary high-level performance estimation on an SCALE/MAMBA based implementation. We expect a handshake time of 1 – 2s. But this of course highly depends on the bandwidth and latency of the underlying communication channels between the MPC parties.
There is also concurrent work on this by Chen et al.:
Weikeng Chen,
Ryan Deng,
Raluca Ada Popa:
N-for-1 Auth: N-wise Decentralized Authentication via One Authentication.
IACR Cryptol. ePrint Arch. 2021: 342 (2021)
Hope that helps.
Best regards
Sven Trieflinger
SW Platforms and Technologies (CR/ADT3)
Robert Bosch GmbH | Postfach 10 60 50 | 70049 Stuttgart |
GERMANY | www.bosch.com
Tel. +49 711 811-24801 | Mobil +49 1525 8813433 |
Threema /
Threema Work: KP6ZF79J | Sven.Tri...@de.bosch.com
Sitz: Stuttgart, Registergericht: Amtsgericht Stuttgart, HRB 14000;
Aufsichtsratsvorsitzender: Franz Fehrenbach; Geschäftsführung: Dr. Volkmar Denner,
Prof. Dr. Stefan Asenkerschbaumer, Filiz Albrecht, Dr. Christian Fischer, Dr. Stefan Hartung,
Dr. Markus Heyn, Harald Kröger, Rolf Najork
--
You received this message because you are subscribed to the Google Groups "SPDZ/SCALE-MAMBA Discussion Group" group.
To unsubscribe from this group and stop receiving emails from it, send an email to
spdz+uns...@googlegroups.com.
To view this discussion on the web, visit
https://groups.google.com/d/msgid/spdz/80255001-54e5-4b95-8ae1-203e61669c71n%40googlegroups.com.
Thank you for sharing your repo! Could you quickly describe which parts are missing for a full TLS handshake? It looks like the primitives for an appropriate TLS cipher spec are all there, right? Is the problem how to bundle up the parts in a way that’s performant?
I’m familiar with DECO and look forward to its release. My main issue is that no DECO code is available yet and Chainlink could not provide a release date so far. At a theoretical level, it also relies on the assumption that the majority of oracle nodes are honest (each perform a TLS 2PC with the client). If it’s feasible for multiple nodes to partake in a joint MPC, then it would suffice to only trust one party, rather than a majority, which I’d find much more attractive.
--
You received this message because you are subscribed to a topic in the Google Groups "SPDZ/SCALE-MAMBA Discussion Group" group.
To unsubscribe from this topic, visit
https://groups.google.com/d/topic/spdz/g-pNz4s8GGE/unsubscribe.
To unsubscribe from this group and all its topics, send an email to
spdz+uns...@googlegroups.com.
To view this discussion on the web, visit
https://groups.google.com/d/msgid/spdz/a38aad60-c349-4913-b3e2-8050ac19eadan%40googlegroups.com.