Efficient Secure Multiparty Computation Protocol in Asynchronous Network

被引:0
|
作者
Huang, Zheng [1 ]
Qiu, Weidong [1 ]
Li, Qiang [1 ]
Chen, Kefei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Informat Secur & Engn, Shanghai 200030, Peoples R China
关键词
Secure Multiparty Computation; Asynchronous Network;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an efficient secure multiparty computation protocol among n players resilient to t < n/4 players in asynchronous model. We use Batch Secret Sharing [9] as building blocks. The construction of our protocol is along the line of [7] and [2] which work in synchronous model. The execution of our protocol can be divided into two phases: Pre-computation phase and the Circuit evaluation phase. The pre-computation phase needs to communicate O(n(4) lg |F| + mn(2) log |F|) bits and Broadcast O(n(2) lg |F|) bits, where m is the number of multiplication gates in the circuit and the circuit is over a finite field F. The circuit evaluation phase needs to communicate O(n(3) lg |F| + n(4) lg n + mn(2) lg |F|) bits and Broadcast O(n(2) lg n) bits. Compared with the well-known secure multiparty computation protocol in asynchronous model [4] which needs to communicate O(mn(4) lg |F| + mn(4) lg n) bits and broadcast O(mn(4) lg n) bits, our protocol is quite efficient.
引用
收藏
页码:152 / 158
页数:7
相关论文
共 50 条
  • [1] An efficient secure multiparty quantum computation protocol
    Lin Song
    Wang Ning
    Liu Xiao-Fen
    [J]. SCIENTIA SINICA-PHYSICA MECHANICA & ASTRONOMICA, 2023, 53 (04)
  • [2] Quorums Quicken Queries: Efficient Asynchronous Secure Multiparty Computation
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    [J]. DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2014, 2014, 8314 : 242 - 256
  • [3] Round Efficient Unconditionally Secure Multiparty Computation Protocol
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 185 - 199
  • [4] Efficient Lookup-Table Protocol in Secure Multiparty Computation
    Launchbury, John
    Diatchki, Iavor S.
    DuBuisson, Thomas
    Adams-Moran, Andy
    [J]. ACM SIGPLAN NOTICES, 2012, 47 (09) : 189 - 200
  • [5] Asynchronous Secure Multiparty Computation in Constant Time
    Cohen, Ran
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 183 - 207
  • [6] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [7] Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel
    Sun, Yi
    Wen, Qiaoyan
    Zhang, Yudong
    Zhang, Hua
    Jin, Zhengping
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [8] Efficient Maliciously Secure Multiparty Computation for RAM
    Keller, Marcel
    Yanai, Avishay
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 91 - 124
  • [9] Efficient Secure Multiparty Computation with Identifiable Abort
    Baum, Carsten
    Orsini, Emmanuela
    Scholl, Peter
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 461 - 490
  • [10] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468