Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexityy

被引:0
|
作者
Eriguchi, Reo [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
关键词
Secure multiparty computation; Bottleneck complexity; Unconditional security; SET INTERSECTION; EFFICIENT; MPC;
D O I
10.1007/978-981-99-8721-4_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bottleneck complexity is an efficiency measure of secure multiparty computation (MPC) introduced by Boyle et al. (ICALP 2018) to achieve load-balancing. Roughly speaking, it is defined as the maximum communication complexity required by any player within the protocol execution. Since it was shown to be impossible to achieve sublinear bottleneck complexity in the number of players n for all functions, a prior work constructed MPC protocols with low bottleneck complexity for specific functions. However, the previous protocol for symmetric functions needs to assume a computational primitive of garbled circuits and its unconditionally secure variant has exponentially large bottleneck complexity in the depth of an arithmetic formula computing the function, which limits the class of symmetric functions the protocol can compute with sublinear bottleneck complexity in n. In this work, we make the following contributions to unconditionally secure MPC protocols for symmetric functions with sublinear bottleneck complexity in n. - We propose for the first time unconditionally secure MPC protocols computing any symmetric function with sublinear bottleneck complexity in n. Technically, our first protocol is inspired by the one-time truth-table protocol by Ishai et al. (TCC 2013) but our second and third protocols use a novel technique to express the one-time truth-table as an array of two or higher dimensions and achieve better trade-offs. - We propose an unconditionally secure protocol tailored to the AND function with lower bottleneck complexity. It avoids pseudorandom functions used by the previous protocol for the AND function, preserving bottleneck complexity up to a logarithmic factor in n. - By combining our protocol for the AND function with Bloom filters, we construct an unconditionally secure protocol for private set intersection (PSI), which computes the intersection of players' private sets. This is the first PSI protocol with sublinear bottleneck complexity in n and to the best of our knowledge, there has been no such protocol even under cryptographic assumptions.
引用
收藏
页码:335 / 368
页数:34
相关论文
共 50 条
  • [42] Asynchronous unconditionally secure computation: An efficiency improvement
    Prabhu, B
    Srinathan, K
    Rangan, CP
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 93 - 107
  • [43] Secure multiparty computation of approximations - (Extended abstract)
    Feigenbaum, J
    Ishai, Y
    Malkin, T
    Nissim, K
    Strauss, MJ
    Wright, RN
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 927 - 938
  • [44] Multiparty Computation: To Secure Privacy, Do the Math
    [J]. Queue, 2023, 21 (06): : 78 - 100
  • [45] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124
  • [46] Secure multiparty quantum computation with few qubits
    Lipinska, Victoria
    Ribeiro, Jeremy
    Wehner, Stephanie
    [J]. PHYSICAL REVIEW A, 2020, 102 (02)
  • [47] The Broadcast Message Complexity of Secure Multiparty Computation
    Garg, Sanjam
    Goel, Aarushi
    Jain, Abhishek
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 : 426 - 455
  • [48] Asynchronous Secure Multiparty Computation in Constant Time
    Cohen, Ran
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 183 - 207
  • [49] Global-Scale Secure Multiparty Computation
    Wang, Xiao
    Ranellucci, Samuel
    Katz, Jonathan
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 39 - 56
  • [50] A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation
    Toft, Tomas
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 20 - 33