Secure multi-party computation in large networks

被引:8
|
作者
Dani, Varsha [1 ]
King, Valerie [2 ]
Movahedi, Mahnush [3 ]
Saia, Jared [1 ]
Zamani, Mahdi [3 ]
机构
[1] Univ New Mexico, Dept Comp Sci, Albuquerque, NM 87131 USA
[2] Univ Victoria, Dept Comp Sci, Victoria, BC, Canada
[3] Yale Univ, Dept Comp Sci, POB 2158, New Haven, CT 06520 USA
基金
美国国家科学基金会;
关键词
Byzantine fault-tolerance; Multi-party computation; Secret-sharing; PROTOCOLS;
D O I
10.1007/s00446-016-0284-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We describe scalable protocols for solving the secure multi-party computation (MPC) problem among a significant number of parties. We consider both the synchronous and the asynchronous communication models. In the synchronous setting, our protocol is secure against a static malicious adversary corrupting less than a 1/3 fraction of the parties. In the asynchronous environment, we allow the adversary to corrupt less than a 1/8 fraction of parties. For any deterministic function that can be computed by an arithmetic circuit with m gates, both of our protocols require each party to send a number of messages and perform an amount of computation that is (O) over tilde (m/n + root n). We also show that our protocols provide statistical and universally-composable security. To achieve our asynchronous MPC result, we define the threshold counting problem and present a distributed protocol to solve it in the asynchronous setting. This protocol is load balanced, with computation, communication and latency complexity of O (log n), and can also be used for designing other load-balanced applications in the asynchronous communication model.
引用
收藏
页码:193 / 229
页数:37
相关论文
共 50 条
  • [1] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    [J]. Distributed Computing, 2017, 30 : 193 - 229
  • [2] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [3] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [4] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [5] A secure delegation scheme of large polynomial computation in multi-party cloud
    Guo, Shu
    Xu, Haixia
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (01) : 1 - 7
  • [6] A secure delegation scheme of large polynomial computation in multi-party cloud
    Institute of Information Engineering, Chinese Academy of Science, Beijing, China
    [J]. Int. J. Grid Util. Comput., 1 (1-7):
  • [7] Multi-Party Secure Computation with Intel SGX for Graph Neural Networks
    Jie, Yixin
    Ren, Yixuan
    Wang, Qingtao
    Xie, Yankai
    Zhang, Chi
    Wei, Lingbo
    Liu, Jianqing
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 528 - 533
  • [8] Information theory and secure multi-party computation
    Maurer, UM
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [9] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [10] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287