On the Round Complexity of Black-Box Secure MPC

被引:4
|
作者
Ishai, Yuval [1 ]
Khurana, Dakshita [2 ]
Sahai, Amit [3 ]
Srinivasan, Akshayaram [4 ]
机构
[1] Technion, Haifa, Israel
[2] UIUC, Champaign, IL USA
[3] UCLA, Los Angeles, CA USA
[4] Tata Inst Fundamental Res, Mumbai, Maharashtra, India
来源
关键词
COMPUTATION; PROTOCOLS;
D O I
10.1007/978-3-030-84245-1_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the question of minimizing the round complexity of secure multiparty computation (MPC) protocols that make a blackbox use of simple cryptographic primitives with security against any number of malicious parties. In the plain model, previous black-box protocols required a high constant number of rounds (>15). This is far from the known lower bound of 4 rounds for protocols with black-box simulators. When allowing random oblivious transfer (OT) correlations, 2-round protocolsmaking black-box use of a pseudorandom generator were known. However, such protocols were obtained via a round-collapsing "protocol garbling" technique that has poor concrete efficiency and makes nonblack-box use of an underlying maliciously secure protocol. We improve this state of affairs by presenting the following types of black-box protocols. - 4-round "pairwise MPC" in the plain model. This roundoptimal protocol enables each ordered pair of parties to compute a function of both inputs whose output is delivered to the second party. The protocolmakes black-box use of any public-key encryption (PKE) with pseudorandom public keys. As a special case, we get a blackbox round-optimal realization of secure (copies of) OT between every ordered pair of parties. - 2-round MPC from OT correlations. This round-optimal protocol makes a black-box use of any general 2-round MPC protocol satisfying an augmented notion of semi-honest security. In the two-party case, this yields new kinds of 2-round black-box protocols. - 5-round MPC in the plain model. This protocol makes a blackbox use of PKE with pseudorandom public keys, and 2-round oblivious transfer with "semi-malicious" security. A key technical tool for the first result is a novel combination of splitstate non-malleable codes (Dziembowski, Pietrzak, and Wichs, JACM'18) with standalone secure two-party protocols to construct non-malleable two-party protocols. The second result is based on a new round-optimized variant of the "IPS compiler" (Ishai, Prabhakaran and Sahai, Crypto'08). The third result is obtained via a specialized combination of these two techniques.
引用
收藏
页码:214 / 243
页数:30
相关论文
共 50 条
  • [1] Two-Round MPC: Information-Theoretic and Black-Box
    Garg, Sanjam
    Ishai, Yuval
    Srinivasan, Akshayaram
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 123 - 151
  • [2] The round-complexity of black-box zero-knowledge: A combinatorial characterization
    Micciancio, Daniele
    Yilek, Scott
    [J]. THEORY OF CRYPTOGRAPHY, 2008, 4948 : 535 - 552
  • [3] Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT
    Ishai, Yuval
    Khurana, Dakshita
    Sahai, Amit
    Srinivasan, Akshayaram
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 441 - 469
  • [4] The quantum black-box complexity of majority
    Hayes, TP
    Kutin, S
    van Melkebeek, D
    [J]. ALGORITHMICA, 2002, 34 (04) : 480 - 501
  • [5] BLACK-BOX COMPLEXITY OF LOCAL MINIMIZATION
    Vavasis, Stephen A.
    [J]. SIAM JOURNAL ON OPTIMIZATION, 1993, 3 (01) : 60 - 80
  • [6] The complexity of black-box ring problems
    Arvind, V.
    Das, Bireswar
    Mukhopadhyay, Partha
    [J]. COMPUTING AND COMBINATORICS, PROCEEDINGS, 2006, 4112 : 126 - 135
  • [7] The Quantum Black-Box Complexity of Majority
    [J]. Algorithmica, 2002, 34 : 480 - 501
  • [8] Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
    Patra, Arpita
    Srinivasan, Akshayaram
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 185 - 213
  • [9] BLACK-BOX CONSTRUCTIONS OF PROTOCOLS FOR SECURE COMPUTATION
    Haitner, Iftach
    Ishai, Yuval
    Kushilevitz, Eyal
    Lindell, Yehuda
    Petrank, Erez
    [J]. SIAM JOURNAL ON COMPUTING, 2011, 40 (02) : 225 - 266
  • [10] Black-Box, Round-Efficient Secure Computation via Non-Malleability Amplification
    Wee, Hoeteck
    [J]. 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 531 - 540