Committed MPC Maliciously Secure Multiparty Computation from Homomorphic Commitments

被引:12
|
作者
Frederiksen, Tore K. [1 ]
Pinkas, Benny [2 ]
Yanai, Avishay [2 ]
机构
[1] Alexandra Inst, Secur Lab, Aarhus, Denmark
[2] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
来源
关键词
D O I
10.1007/978-3-319-76578-5_20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new multiparty computation protocol secure against a static and malicious dishonest majority. Unlike most previous protocols that were based on working on MAC-ed secret shares, our approach is based on computations on homomorphic commitments to secret shares. Specifically we show how to realize MPC using any additively-homomorphic commitment scheme, even if such a scheme is an interactive two-party protocol. Our new approach enables us to do arithmetic computation over arbitrary finite fields. In addition, since our protocol computes over committed values, it can be readily composed within larger protocols, and can also be used for efficiently implementing committing OT or committed OT. This is done in two steps, each of independent interest: 1. Black-box extension of any (possibly interactive) two-party additively homomorphic commitment scheme to an additively homomorphic multiparty commitment scheme, only using coin-tossing and a "weak" equality evaluation functionality. 2. Realizing multiplication of multiparty commitments based on a lightweight preprocessing approach. Finally we show how to use the fully homomorphic commitments to compute any functionality securely in the presence of a malicious adversary corrupting any number of parties.
引用
收藏
页码:587 / 619
页数:33
相关论文
共 50 条
  • [1] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124
  • [2] EFFICIENTLY SECURE MULTIPARTY COMPUTATION BASED ON HOMOMORPHIC ENCRYPTION
    Yao, Yuangang
    Wei, Jinxia
    Liu, Jianyi
    Zhang, Ru
    [J]. PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 343 - 349
  • [3] Fluid MPC: Secure Multiparty Computation with Dynamic Participants
    Choudhuri, Arka Rai
    Goel, Aarushi
    Green, Matthew
    Jain, Abhishek
    Kaptchuk, Gabriel
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 94 - 123
  • [4] Secure Multiparty Computation via Fully Homomorphic Encryption Scheme
    Han, Jing-Li
    Wang, Zhao-Li
    Shi, Ya-Qing
    Wang, Mei-Juan
    Dong, Hui
    [J]. 2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 250 - 253
  • [5] Multiparty computation from threshold homomorphic encryption
    Cramer, R
    Damgard, I
    Nielsen, JB
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2001, PROCEEDINGS, 2001, 2045 : 280 - 300
  • [6] Multiparty Computation from Somewhat Homomorphic Encryption
    Damgard, Ivan
    Pastro, Valerio
    Smart, Nigel
    Zakarias, Sarah
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 643 - 662
  • [7] Secure Multiparty Computation from SGX
    Bahmani, Raad
    Barbosa, Manuel
    Brasser, Ferdinand
    Portela, Bernardo
    Sadeghi, Ahmad-Reza
    Scerri, Guillaume
    Warinschi, Bogdan
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2017, 2017, 10322 : 477 - 497
  • [8] Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain
    Bao, Haijun
    Yuan, Minghao
    Deng, Haitao
    Xu, Jiang
    Zhao, Yekang
    [J]. HELIYON, 2024, 10 (14)
  • [9] Secure Multiparty Computation
    Lindell, Yehuda
    [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [10] Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
    Poddar, Rishabh
    Kalra, Sukrit
    Yanai, Avishay
    Deng, Ryan
    Popa, Raluca Ada
    Hellerstein, Joseph M.
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2129 - 2146