TinyKeys: A New Approach to Efficient Multi-Party Computation

被引:3
|
作者
Hazay, Carmit [1 ]
Orsini, Emmanuela [2 ]
Scholl, Peter [3 ]
Soria-Vazquez, Eduardo [4 ]
机构
[1] Bar Ilan Univ, Ramat Gan, Israel
[2] Katholieke Univ Leuven, IMEC, COSIC, Leuven, Belgium
[3] Aarhus Univ, Aarhus, Denmark
[4] Technol Innovat Inst, Cryptog Res Ctr, Abu Dhabi, U Arab Emirates
基金
欧洲研究理事会;
关键词
Multi-Party Computation; Syndrome Decoding; Large-Scale; XOR GATES; ALGORITHM; SECURITY; CIRCUIT; CODE; BMR;
D O I
10.1007/s00145-022-09423-5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact that within the dishonest majority setting the efficiency of most practical protocols does not depend on the number of honest parties, we investigate how to construct protocols which improve in efficiency as the number of honest parties increases. Our central idea is to take a protocol which is secure for n - 1 corruptions and modify it to use short symmetric keys, with the aim of basing security on the concatenation of all honest parties' keys. This results in a more efficient protocol tolerating fewer corruptions, whilst also introducing an LPN-style syndrome decoding assumption. We first apply this technique to a modified version of the semi-honest GMW protocol, using OT extension with short keys, to improve the efficiency of standard GMW with fewer corruptions. We also obtain more efficient constant-round MPC, using BMR-style garbled circuits with short keys, and present an implementation of the online phase of this protocol. Our techniques start to improve upon existing protocols when there are around n = 10 parties with h = 4 honest parties, and as these increase we obtain up to a 13 times reduction (for n = 400, h = 120) in communication complexity for our GMW variant, compared with the best-known GMW-based protocol modified to use the same threshold.
引用
收藏
页数:66
相关论文
共 50 条
  • [41] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [42] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    [J]. Journal of Cryptology, 2005, 18 : 247 - 287
  • [43] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    [J]. Distributed Computing, 2017, 30 : 193 - 229
  • [44] Universally Composable Quantum Multi-party Computation
    Unruh, Dominique
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 486 - 505
  • [45] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [46] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [47] Secure multi-party computation made simple
    Maurer, U
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [48] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [49] Post-Quantum Multi-Party Computation
    Agarwal, Amit
    Bartusek, James
    Goyal, Vipul
    Khurana, Dakshita
    Malavolta, Giulio
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 435 - 464
  • [50] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    [J]. CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266