Two-Round MPC: Information-Theoretic and Black-Box

被引:27
|
作者
Garg, Sanjam [1 ]
Ishai, Yuval [2 ]
Srinivasan, Akshayaram [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Technion, Haifa, Israel
来源
基金
欧洲研究理事会;
关键词
OBLIVIOUS TRANSFER; EFFICIENT;
D O I
10.1007/978-3-030-03807-6_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We continue the study of protocols for secure multiparty computation (MPC) that require only two rounds of interaction. The recent works of Garg and Srinivasan (Eurocrypt 2018) and Benhamouda and Lin (Eurocrypt 2018) essentially settle the question by showing that such protocols are implied by the minimal assumption that a tworound oblivious transfer (OT) protocol exists. However, these protocols inherently make a non-black-box use of the underlying OT protocol, which results in poor concrete efficiency. Moreover, no analogous result was known in the information-theoretic setting, or alternatively based on one-way functions, given an OT correlations setup or an honest majority. Motivated by these limitations, we study the possibility of obtaining information-theoretic and "black-box" implementations of two-round MPC protocols. We obtain the following results: - Two-round MPC from OT correlations. Given an OT correlations setup, we get protocols that make a black-box use of a pseudorandom generator (PRG) and are secure against a malicious adversary corrupting an arbitrary number of parties. For a semihonest adversary, we get similar information-theoretic protocols for branching programs. - New NIOT constructions. Towards realizing OT correlations, we extend the DDH-based non-interactive OT (NIOT) protocol of Bellare and Micali (Crypto'89) to the malicious security model, and present new NIOT constructions from the Quadratic Residuosity Assumption (QRA) and the Learning With Errors (LWE) assumption. - Two-round black-box MPC with strong PKI setup. Combining the two previous results, we get two-round MPC protocols that make a black-box use of any DDH-hard or QRA-hard group. The protocols can offer security against a malicious adversary, and require a PKI setup that depends on the number of parties and the size of computation, but not on the inputs or the identities of the participating parties. - Two-round honest-majority MPC from secure channels. Given secure point-to-point channels, we get protocols that make a black-box use of a pseudorandom generator (PRG), as well as information-theoretic protocols for branching programs. These protocols can tolerate a semi-honest adversary corrupting a strict minority of the parties, where in the information-theoretic case the complexity is exponential in the number of parties.
引用
收藏
页码:123 / 151
页数:29
相关论文
共 50 条
  • [1] Two Round Information-Theoretic MPC with Malicious Security
    Ananth, Prabhanjan
    Choudhuri, Arka Rai
    Goel, Aarushi
    Jain, Abhishek
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 532 - 561
  • [2] Information-theoretic generalization bounds for black-box learning algorithms
    Harutyunyan, Hrayr
    Raginsky, Maxim
    Ver Steeg, Greg
    Galstyan, Aram
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [3] On the Round Complexity of Black-Box Secure MPC
    Ishai, Yuval
    Khurana, Dakshita
    Sahai, Amit
    Srinivasan, Akshayaram
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 214 - 243
  • [4] Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT
    Ishai, Yuval
    Khurana, Dakshita
    Sahai, Amit
    Srinivasan, Akshayaram
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 441 - 469
  • [5] Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
    Patra, Arpita
    Srinivasan, Akshayaram
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 185 - 213
  • [6] Round-Optimal Black-Box MPC in the Plain Model
    Ishai, Yuval
    Khurana, Dakshita
    Sahai, Amit
    Srinivasan, Akshayaram
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 393 - 426
  • [7] Information-Theoretic 2-Round MPC Without Round Collapsing: Adaptive Security, and More
    Lin, Huijia
    Liu, Tianren
    Wee, Hoeteck
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 502 - 531
  • [8] Best Possible Information-Theoretic MPC
    Halevi, Shai
    Ishai, Yuval
    Kushilevitz, Eyal
    Rabin, Tal
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 255 - 281
  • [9] Broadcast-Optimal Two-Round MPC
    Cohen, Ran
    Garay, Juan
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 828 - 858
  • [10] Reusable Two-Round MPC from LPN
    Bartusek, James
    Garg, Sanjam
    Srinivasan, Akshayaram
    Zhang, Yinuo
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 165 - 193