Paper 2026/216

ECHO: Efficient Covertly-Secure Three-party Computation with Applications to Private Machine Learning

Yufei Duan, Tsinghua University
Yun Li, Ant Group
Zhicong Huang, Ant Group
Cheng Hong, Ant Group
Tao Wei, Ant Group
Chao Zhang, Tsinghua University
Abstract

Secure three-party computation with an honest majority is one of the most efficient settings in secure computation, and has been widely adopted in practical applications. However, achieving malicious security in this setting incurs significant concrete efficiency penalties, which could be an order of magnitude worse than that of their semi-honest counterparts. Covert security offers a potential security-efficiency trade-off by detecting malicious behavior with a certain probability (such as $50\%$), deterring rational adversaries through the risk of detection and loss of credibility. Yet, existing covert security research primarily focuses on two-party or general $n$-party protocols in the dishonest-majority setting, with limited progress toward efficient three-party solutions. This work presents the first comprehensive framework, $\mathsf{ECHO}$, for covertly secure, honest-majority three-party computation with applications to privacy-preserving machine learning. We systematically explore the design space of cheating detection and cheater identification techniques, and propose a suite of novel protocols for both arithmetic and Boolean circuits. Each protocol is engineered for a distinct performance goal: minimal online latency, high end-to-end efficiency, or low communication. Notably, for arithmetic circuits over rings, we introduce a protocol leveraging asymmetric message authentication codes, achieving an online phase that is only $1.26\times$ slower than the semi-honest baseline, over three times faster than its maliciously secure counterpart. For Boolean circuits, our novel cut-and-choose-based method outperforms the best previous maliciously secure protocol by a factor of five. In practical PPML benchmarks, our framework achieves near semi-honest performance while delivering up to $8\times$ speedup over maliciously secure protocols on real-world tasks.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
secure multi-party computationthree-party computationcovert securityprivacy-preserving machine learning
Contact author(s)
dyf23 @ mails tsinghua edu cn
liyun24 @ antgroup com
zhicong hzc @ antgroup com
vince hc @ antgroup com
lenx wei @ antgroup com
chaoz @ tsinghua edu cn
History
2026-02-12: revised
2026-02-10: received
See all versions
Short URL
https://ia.cr/2026/216
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2026/216,
      author = {Yufei Duan and Yun Li and Zhicong Huang and Cheng Hong and Tao Wei and Chao Zhang},
      title = {{ECHO}: Efficient Covertly-Secure Three-party Computation with Applications to Private Machine Learning},
      howpublished = {Cryptology {ePrint} Archive, Paper 2026/216},
      year = {2026},
      url = {https://eprint.iacr.org/2026/216}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.