Perfectly-secure MPC with linear communication complexity

被引:0
|
作者
Beerliova-Trubiniova, Zuzana [1 ]
Hirt, Martin [1 ]
机构
[1] ETH, Dept Comp Sci, CH-8092 Zurich, Switzerland
来源
THEORY OF CRYPTOGRAPHY | 2008年 / 4948卷
关键词
multi-party computation; efficiency; perfect security; hyper-invertible matrix;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function, even when up to t players are under the control of an adversary. Known perfectly secure MPC protocols require communication of at least Omega(n(3)) field elements per multiplication, whereas cryptographic or unconditional security is possible with communication linear in the number of players. We present a perfectly secure MPC protocol communicating 0(n) field elements per multiplication. Our protocol provides perfect security against an active, adaptive adversary corrupting t < n/3 players, which is optimal. Thus our protocol improves the security of the most efficient information-theoretically secure protocol at no extra costs, respectively improves the efficiency of perfectly secure MPC protocols by a factor of Omega (n(2)). To achieve this, we introduce a novel technique - constructing detectable protocols with the help of so-called hyper-invertible matrices, which we believe to be of independent interest. Hyper-invertible matrices allow (among other things) to perform efficient correctness checks of many instances in parallel, which was until now possible only if error-probability was allowed.
引用
收藏
页码:213 / 230
页数:18
相关论文
共 50 条
  • [1] Simple and efficient perfectly-secure asynchronous MPC
    Beerliova-Trubiniova, Zuzana
    Hirt, Martin
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 376 - 392
  • [2] Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    [J]. PROCEEDINGS OF THE 2022 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, PODC 2022, 2022, : 92 - 102
  • [3] Perfectly-Secure Synchronous MPC With Asynchronous Fallback Guarantees
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5386 - 5425
  • [4] Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
    Choudhury, Ashish
    Pappu, Nikhil
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 786 - 809
  • [5] The BGW protocol for perfectly-secure multiparty computation
    Asharov, Gilad
    Lindell, Yehuda
    [J]. Cryptology and Information Security Series, 2013, 10 : 120 - 167
  • [6] Adaptively Secure MPC with Sublinear Communication Complexity
    Ran Cohen
    Abhi Shelat
    Daniel Wichs
    [J]. Journal of Cryptology, 2023, 36
  • [7] Adaptively Secure MPC with Sublinear Communication Complexity
    Cohen, Ran
    Shelat, Abhi
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 30 - 60
  • [8] Adaptively Secure MPC with Sublinear Communication Complexity
    Cohen, Ran
    Shelat, Abhi
    Wichs, Daniel
    [J]. JOURNAL OF CRYPTOLOGY, 2023, 36 (02)
  • [9] Perfectly-Secure Multiplication for Any t &lt; n/3
    Asharov, Gilad
    Lindell, Yehuda
    Rabin, Tal
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 240 - 258
  • [10] Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 184 - 202