Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexityy

被引:0
|
作者
Eriguchi, Reo [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
关键词
Secure multiparty computation; Bottleneck complexity; Unconditional security; SET INTERSECTION; EFFICIENT; MPC;
D O I
10.1007/978-981-99-8721-4_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bottleneck complexity is an efficiency measure of secure multiparty computation (MPC) introduced by Boyle et al. (ICALP 2018) to achieve load-balancing. Roughly speaking, it is defined as the maximum communication complexity required by any player within the protocol execution. Since it was shown to be impossible to achieve sublinear bottleneck complexity in the number of players n for all functions, a prior work constructed MPC protocols with low bottleneck complexity for specific functions. However, the previous protocol for symmetric functions needs to assume a computational primitive of garbled circuits and its unconditionally secure variant has exponentially large bottleneck complexity in the depth of an arithmetic formula computing the function, which limits the class of symmetric functions the protocol can compute with sublinear bottleneck complexity in n. In this work, we make the following contributions to unconditionally secure MPC protocols for symmetric functions with sublinear bottleneck complexity in n. - We propose for the first time unconditionally secure MPC protocols computing any symmetric function with sublinear bottleneck complexity in n. Technically, our first protocol is inspired by the one-time truth-table protocol by Ishai et al. (TCC 2013) but our second and third protocols use a novel technique to express the one-time truth-table as an array of two or higher dimensions and achieve better trade-offs. - We propose an unconditionally secure protocol tailored to the AND function with lower bottleneck complexity. It avoids pseudorandom functions used by the previous protocol for the AND function, preserving bottleneck complexity up to a logarithmic factor in n. - By combining our protocol for the AND function with Bloom filters, we construct an unconditionally secure protocol for private set intersection (PSI), which computes the intersection of players' private sets. This is the first PSI protocol with sublinear bottleneck complexity in n and to the best of our knowledge, there has been no such protocol even under cryptographic assumptions.
引用
收藏
页码:335 / 368
页数:34
相关论文
共 50 条
  • [31] Secure Multiparty Computation Using Secure Virtual Machines
    Miladinovic, Danko
    Milakovic, Adrian
    Vukasovic, Maja
    Stanisavljevic, Zarko
    Vuletic, Pavle
    [J]. ELECTRONICS, 2024, 13 (05)
  • [32] General secure multiparty computation - Preface
    Goldreich, O
    [J]. JOURNAL OF CRYPTOLOGY, 2000, 13 (01) : 1 - 7
  • [33] Secure Multiparty Computation Goes Live
    Bogetoft, Peter
    Christensen, Dan Lund
    Damgard, Ivan
    Geisler, Martin
    Jakobsen, Thomas
    Kroigaard, Mikkel
    Nielsen, Janus Dam
    Nielsen, Jesper Buns
    Nielsen, Jurt
    Pagter, Jakob
    Schwartzbach, Michael
    Toft, Tomas
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 325 - +
  • [34] Secure Multiparty Computation with Sublinear Preprocessing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    Nof, Ariel
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 427 - 457
  • [35] Secure multiparty computation of a comparison problem
    Liu, Xin
    Li, Shundong
    Liu, Jian
    Chen, Xiubo
    Xu, Gang
    [J]. SPRINGERPLUS, 2016, 5
  • [36] Secure Multiparty Computation from SGX
    Bahmani, Raad
    Barbosa, Manuel
    Brasser, Ferdinand
    Portela, Bernardo
    Sadeghi, Ahmad-Reza
    Scerri, Guillaume
    Warinschi, Bogdan
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 477 - 497
  • [37] On the Message Complexity of Secure Multiparty Computation
    Ishai, Yuval
    Mittal, Manika
    Ostrovsky, Rafail
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 698 - 711
  • [38] Secure multiparty computation for comparator networks
    Morohashi, Gembu
    Chida, Koji
    Hirota, Keiichi
    Kikuchi, Hiroaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2349 - 2355
  • [39] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [40] A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation
    Laud, Peeter
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 143 - 157