Round Efficient Unconditionally Secure Multiparty Computation Protocol

被引:0
|
作者
Patra, Arpita [1 ]
Choudhary, Ashish [1 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Madras 600036, Tamil Nadu, India
来源
关键词
Multiparty Computation; Information Theoretic Security;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a round efficient unconditionally secure multiparty computation (UMPC) protocol in information theoretic model with n > 2t players, in the absence of any physical broadcast channel. Our protocol communicates O(n(4)) field elements per multiplication and requires O(n log(n) + D) rounds, even if up to t players are under the control of all active adversary having unbounded computing power, where D denotes the multiplicative depth of the circuit representing the function to be computed securely. In the absence of a physical broadcast channel and with n > 2t players, the best known UMPC protocol with minimum number of rounds, requires O(n(2)D) rounds and communicates O(n(6)) field elements per multiplication. On the other hand, the best known UMPC protocol with minimum communication complexity requires communication overhead of O(n(2)) field elements per multiplication, but has a round complexity of O(n(3) + D) rounds. Hence our UMPC protocol is the most round efficient protocol so far and ranks second according to communication complexity.
引用
收藏
页码:185 / 199
页数:15
相关论文
共 50 条
  • [1] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468
  • [2] Scalable and unconditionally secure multiparty computation
    Damgard, Ivan
    Nielsen, Jesper Buns
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2007, PROCEEDINGS, 2007, 4622 : 572 - 590
  • [3] An efficient secure multiparty quantum computation protocol
    Lin Song
    Wang Ning
    Liu Xiao-Fen
    [J]. SCIENTIA SINICA-PHYSICA MECHANICA & ASTRONOMICA, 2023, 53 (04)
  • [4] Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 398 - 417
  • [5] Efficient Secure Multiparty Computation Protocol in Asynchronous Network
    Huang, Zheng
    Qiu, Weidong
    Li, Qiang
    Chen, Kefei
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 152 - 158
  • [6] Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort
    Alon, Bar
    Chung, Hao
    Chung, Kai-Min
    Huang, Mi-Ying
    Lee, Yi
    Shen, Yu-Ching
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 436 - 466
  • [7] Efficient Lookup-Table Protocol in Secure Multiparty Computation
    Launchbury, John
    Diatchki, Iavor S.
    DuBuisson, Thomas
    Adams-Moran, Andy
    [J]. ACM SIGPLAN NOTICES, 2012, 47 (09) : 189 - 200
  • [8] On 2-round secure multiparty computation
    Gennaro, R
    Ishai, Y
    Kushilevitz, E
    Rabin, T
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 178 - 193
  • [9] On Unconditionally Secure Multiparty Computation for Realizing Correlated Equilibria in Games
    Wang, Ye
    Rane, Shantanu
    Ishwar, Prakash
    [J]. 2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 241 - 244
  • [10] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,