Efficient Secure Multiparty Computation Protocol in Asynchronous Network

被引:0
|
作者
Huang, Zheng [1 ]
Qiu, Weidong [1 ]
Li, Qiang [1 ]
Chen, Kefei [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Informat Secur & Engn, Shanghai 200030, Peoples R China
关键词
Secure Multiparty Computation; Asynchronous Network;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an efficient secure multiparty computation protocol among n players resilient to t < n/4 players in asynchronous model. We use Batch Secret Sharing [9] as building blocks. The construction of our protocol is along the line of [7] and [2] which work in synchronous model. The execution of our protocol can be divided into two phases: Pre-computation phase and the Circuit evaluation phase. The pre-computation phase needs to communicate O(n(4) lg |F| + mn(2) log |F|) bits and Broadcast O(n(2) lg |F|) bits, where m is the number of multiplication gates in the circuit and the circuit is over a finite field F. The circuit evaluation phase needs to communicate O(n(3) lg |F| + n(4) lg n + mn(2) lg |F|) bits and Broadcast O(n(2) lg n) bits. Compared with the well-known secure multiparty computation protocol in asynchronous model [4] which needs to communicate O(mn(4) lg |F| + mn(4) lg n) bits and broadcast O(mn(4) lg n) bits, our protocol is quite efficient.
引用
收藏
页码:152 / 158
页数:7
相关论文
共 50 条
  • [31] A database privacy information query protocol based on secure multiparty computation
    [J]. Zhang, T. (Zhangtao2668@126.com), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (06):
  • [32] A Private Lookup Protocol with Low Online Complexity for Secure Multiparty Computation
    Laud, Peeter
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 143 - 157
  • [33] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [34] Secure multiparty computation of DNF
    Peng, Kun
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [35] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [36] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [37] General quantum secure multiparty computation protocol for simultaneous summation and multiplication
    Li, Fulin
    Luo, Mei
    Zhu, Shixin
    Pang, Binbin
    [J]. PHYSICA SCRIPTA, 2024, 99 (01)
  • [38] Asynchronous Multiparty Computation: Theory and Implementation
    Damgard, Ivan
    Geisler, Martin
    Kroigaard, Mikkel
    Nielsen, Jesper Buus
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 160 - 179
  • [39] Efficient Collusion-Tolerable Secure Multiparty Computation of Weighted Average
    Duan, Hongwei
    Du, Runmeng
    Wei, Qiong
    Wang, Wenli
    Liu, Xin
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 412 - 415
  • [40] Efficient optimisation framework for convolutional neural networks with secure multiparty computation
    Berry, Cate
    Komninos, Nikos
    [J]. COMPUTERS & SECURITY, 2022, 117