Efficient secure multi-party computation - (Extended abstract)

被引:0
|
作者
Hirt, M [1 ]
Maurer, U
Przydatek, B
机构
[1] ETH Zurich, Zurich, Switzerland
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n(6)) field elements for each multiplication of two elements, even if only one player cheats. In this paper, we propose a perfectly secure multi-party protocol which requires communicating O(n(3)) field elements per multiplication. In this protocol, the number of invocations of the broadcast primitive is independent of the size of the circuit to be computed. The proposed techniques are generic and apply to other protocols for robust distributed computations. Furthermore, we show that a sub-protocol proposed in [GRR98] for improving the efficiency of unconditionally secure multi-party computation is insecure.
引用
收藏
页码:143 / 161
页数:19
相关论文
共 50 条
  • [1] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    [J]. EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [2] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [3] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [4] Rabbit: Efficient Comparison for Secure Multi-Party Computation
    Makri, Eleftheria
    Rotaru, Dragos
    Vercauteren, Frederik
    Wagh, Sameer
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 249 - 270
  • [5] Rationality and adversarial behavior in multi-party computation (Extended abstract)
    Lysyanskaya, Anna
    Triandopoulos, Nikos
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 180 - 197
  • [6] Round Efficient Computationally Secure Multi-party Computation Revisited
    Bangalore, Laasya
    Choudhury, Ashish
    Garimella, Gayathri
    [J]. ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2019, : 292 - 301
  • [7] Trading correctness for privacy in unconditional multi-party computation (extended abstract)
    Fitzi, M
    Hirt, M
    Maurer, U
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'98, 1998, 1462 : 121 - 136
  • [8] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [9] Nearly universal and efficient quantum secure multi-party computation protocol
    Han Yushan
    Che Bichen
    Liu Jiali
    Dou Zhao
    Di Junyu
    [J]. The Journal of China Universities of Posts and Telecommunications, 2022, 29 (04) : 51 - 68
  • [10] Concretely efficient secure multi-party computation protocols: survey and more
    Dengguo Feng
    Kang Yang
    [J]. Security and Safety, 2022, 1 (01) : 48 - 90