Information-Theoretic 2-Round MPC Without Round Collapsing: Adaptive Security, and More

被引:6
|
作者
Lin, Huijia [1 ]
Liu, Tianren [1 ]
Wee, Hoeteck [2 ,3 ]
机构
[1] Univ Washington, Seattle, WA 98195 USA
[2] NTT Res, Los Angeles, CA USA
[3] ENS, Paris, France
来源
关键词
COMPUTATION;
D O I
10.1007/978-3-030-64378-2_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present simpler and improved constructions of 2-round protocols for secure multi-party computation (MPC) in the semi-honest setting. Our main results are new information-theoretically secure protocols for arithmetic NC1 in two settings: (i) the plain model tolerating up to t < n/2 corruptions; and (ii) in the OLE-correlation model tolerating any number of corruptions. Our protocols achieve adaptive security and require only black-box access to the underlying field, whereas previous results only achieve static security and require non-black-box field access. Moreover, both results extend to polynomial-size circuits with computational and adaptive security, while relying on black-box access to a pseudorandom generator. In the OLE correlation model, the extended protocols for circuits tolerate up to n - 1 corruptions. Along the way, we introduce a conceptually novel framework for 2-round MPC that does not rely on the round collapsing framework underlying all of the recent advances in 2-round MPC.
引用
收藏
页码:502 / 531
页数:30
相关论文
共 8 条
  • [1] Two Round Information-Theoretic MPC with Malicious Security
    Ananth, Prabhanjan
    Choudhuri, Arka Rai
    Goel, Aarushi
    Jain, Abhishek
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 532 - 561
  • [2] Two-Round MPC: Information-Theoretic and Black-Box
    Garg, Sanjam
    Ishai, Yuval
    Srinivasan, Akshayaram
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 123 - 151
  • [3] Two-Round MPC Without Round Collapsing Revisited - Towards Efficient Malicious Protocols
    Lin, Huijia
    Liu, Tianren
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 353 - 382
  • [4] Information-theoretic security without an honest majority
    Broadbent, Anne
    Tapp, Alain
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2007, 2007, 4833 : 410 - 426
  • [5] GAC: Gain-Aware 2-Round Cooperative Caching Approach in Information-Centric Networking
    Zhi, Jiang
    Li, Jun
    Wu, Haibo
    Ren, Yongmao
    2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2018,
  • [6] Mechanizing the Proof of Adaptive, Information-theoretic Security of Cryptographic Protocols in the Random Oracle Model
    Stoughton, Alley
    Varia, Mayank
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 83 - 99
  • [7] On Fully-Secure Honest Majority MPC Without n2 Round Overhead
    Escudero, Daniel
    Fehr, Serge
    PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 47 - 66
  • [8] The round femoral stem provides a similar clinical outcome but more serious proximal stress shielding compared to the rectangular stem in cementless total hip arthroplasty without a shortening osteotomy in patients with Crowe type 2 or 3 hip dysplasia
    Kayaalp, M. Enes
    Erdogan, Fahri
    Kaynak, Gokhan
    JOINT DISEASES AND RELATED SURGERY, 2022, 33 (02): : 393 - 398