An Efficient Framework for Unconditionally Secure Multiparty Computation

被引:28
|
作者
Choudhury, Ashish [1 ]
Patra, Arpita [2 ]
机构
[1] Int Inst Informat Technol, Bengaluru 560100, India
[2] Indian Inst Sci, Dept Comp Sci & Automat, Bengaluru 560012, India
关键词
Cryptographic protocols; information-theoretic security; multiparty computation; SECRETS;
D O I
10.1109/TIT.2016.2614685
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties to securely compute an agreed function f over some finite field in the presence of a computationally unbounded adversary, who can maliciously corrupt any t out of the n parties. Most of the known efficient MPC protocols are designed in the offline-online framework introduced in a seminal work by Beaver in CRYPTO 1991. In this framework, the parties generate shared random and private multiplication-triples during the offline phase, which are used later in the online phase for securely evaluating the multiplication gates in the circuit representing f. The efficiency of the MPC protocols in this framework then relies on efficient ways of implementing the offline phase. In this paper, we propose a new and simple framework for generating shared and private random multiplication triples with unconditional security. The existing protocols approach this problem by first producing shared pairs of private and random values, followed by securely computing the shared product of each pair of values. The latter task involves a multiplication protocol for shared values that are typically communication intensive. Our framework takes a completely different approach and shuns the use of multiplication protocol. Namely, we ask the parties to verifiably share random multiplication triples and then securely extract shared random multiplication triples unknown to the adversary, from the shared triples. Realizing our framework in the asynchronous and hybrid network setting, 1 we present the first ever MPC protocols with a linear (in the number of parties) communication overhead per multiplication gate in the circuit representing f. These are significant improvements over the best known existing MPC protocols in the asynchronous and hybrid network setting with communication complexity O(n(2)) and O(n(3)), respectively. Our framework when applied to the synchronous setting results in round-efficient MPC protocols.
引用
收藏
页码:428 / 468
页数:41
相关论文
共 50 条
  • [1] Round Efficient Unconditionally Secure Multiparty Computation Protocol
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 185 - 199
  • [2] Scalable and unconditionally secure multiparty computation
    Damgard, Ivan
    Nielsen, Jesper Buns
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 572 - 590
  • [3] On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games
    Wang, Ye
    Rane, Shantanu
    Ishwar, Prakash
    [J]. 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 241 - 244
  • [4] Efficient optimisation framework for convolutional neural networks with secure multiparty computation
    Berry, Cate
    Komninos, Nikos
    [J]. COMPUTERS & SECURITY, 2022, 117
  • [5] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [6] Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexityy
    Eriguchi, Reo
    [J]. ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT I, 2023, 14438 : 335 - 368
  • [7] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124
  • [8] Efficient Secure Multiparty Computation with Identifiable Abort
    Baum, Carsten
    Orsini, Emmanuela
    Scholl, Peter
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 461 - 490
  • [9] An efficient simulation for quantum secure multiparty computation
    Kartick Sutradhar
    Hari Om
    [J]. Scientific Reports, 11
  • [10] An efficient simulation for quantum secure multiparty computation
    Sutradhar, Kartick
    Om, Hari
    [J]. SCIENTIFIC REPORTS, 2021, 11 (01)