Unconditionally Secure Computation with Reduced Interaction

被引:5
|
作者
Damgard, Ivan [1 ]
Nielsen, Jesper Buus [1 ]
Ostrovsky, Rafail [2 ]
Rosen, Adi [3 ,4 ]
机构
[1] Aarhus Univ, Dept Comp Sci, Aarhus, Denmark
[2] Univ Calif Los Angeles, Los Angeles, CA USA
[3] CNRS, Paris, France
[4] Univ Paris Diderot, Paris, France
关键词
D O I
10.1007/978-3-662-49896-5_15
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the question of how much interaction is needed for unconditionally secure multiparty computation. We first consider the number of messages that need to be sent to compute a Boolean function with semi-honest security, where all n parties learn the result. We consider two classes of functions called t-difficult and t-very difficult functions, where t refers to the number of corrupted players. For instance, the AND of an input bit from each player is t-very difficult while the XOR is t-difficult but not t-very difficult. We show lower bounds on the message complexity of both types of functions, considering two notions of message complexity called conservative and liberal, where conservative is the more standard one. In all cases the bounds are Omega(nt). We also show (almost) matching upper bounds for t = 1 and functions in a rich class PSMeff including non-deterministic log-space, as well as a stronger upper bound for the XOR function. In particular, we find that the conservative message complexity of 1-very difficult functions in PSMeff is 2n, while the conservative message complexity for XOR (and t = 1) is 2n - 1. Next, we consider round complexity. It is a long-standing open problem to determine whether all efficiently computable functions can also be efficiently computed in constant-round with unconditional security. Motivated by this, we consider the question of whether we can compute any function securely, while minimizing the interaction of some of the players? And if so, how many players can this apply to? Note that we still want the standard security guarantees (correctness, privacy, termination) and we consider the standard communication model with secure point-to-point channels. We answer the questions as follows: for passive security, with n = 2l + 1 players and l corruptions, up to l players can have minimal interaction, i.e., they send 1 message in the first round to each of the t + 1 remaining players and receive one message from each of them in the last round. Using our result on message complexity, we show that this is (unconditionally) optimal. For malicious security with n = 3t + 1 players and t corruptions, up to t players can have minimal interaction, and we show that this is also optimal.
引用
收藏
页码:420 / 447
页数:28
相关论文
共 50 条
  • [1] Scalable and unconditionally secure multiparty computation
    Damgard, Ivan
    Nielsen, Jesper Buns
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 572 - 590
  • [2] Asynchronous unconditionally secure computation: An efficiency improvement
    Prabhu, B
    Srinathan, K
    Rangan, CP
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 93 - 107
  • [3] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468
  • [4] Round Efficient Unconditionally Secure Multiparty Computation Protocol
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 185 - 199
  • [5] Unconditionally Secure Computation Against Low-Complexity Leakage
    Bogdanov, Andrej
    Ishai, Yuval
    Srinivasan, Akshayaram
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 387 - 416
  • [6] On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games
    Wang, Ye
    Rane, Shantanu
    Ishwar, Prakash
    [J]. 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 241 - 244
  • [7] Unconditionally Secure Computation Against Low-Complexity Leakage
    Bogdanov, Andrej
    Ishai, Yuval
    Srinivasan, Akshayaram
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (04)
  • [8] Unconditionally Secure Computation Against Low-Complexity Leakage
    Andrej Bogdanov
    Yuval Ishai
    Akshayaram Srinivasan
    [J]. Journal of Cryptology, 2021, 34
  • [9] Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexityy
    Eriguchi, Reo
    [J]. ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT I, 2023, 14438 : 335 - 368
  • [10] Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage
    Andrej Bogdanov
    Yuval Ishai
    Akshayaram Srinivasan
    [J]. Journal of Cryptology, 2022, 35