Two-Round MPC: Information-Theoretic and Black-Box

被引:27
|
作者
Garg, Sanjam [1 ]
Ishai, Yuval [2 ]
Srinivasan, Akshayaram [1 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Technion, Haifa, Israel
来源
基金
欧洲研究理事会;
关键词
OBLIVIOUS TRANSFER; EFFICIENT;
D O I
10.1007/978-3-030-03807-6_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We continue the study of protocols for secure multiparty computation (MPC) that require only two rounds of interaction. The recent works of Garg and Srinivasan (Eurocrypt 2018) and Benhamouda and Lin (Eurocrypt 2018) essentially settle the question by showing that such protocols are implied by the minimal assumption that a tworound oblivious transfer (OT) protocol exists. However, these protocols inherently make a non-black-box use of the underlying OT protocol, which results in poor concrete efficiency. Moreover, no analogous result was known in the information-theoretic setting, or alternatively based on one-way functions, given an OT correlations setup or an honest majority. Motivated by these limitations, we study the possibility of obtaining information-theoretic and "black-box" implementations of two-round MPC protocols. We obtain the following results: - Two-round MPC from OT correlations. Given an OT correlations setup, we get protocols that make a black-box use of a pseudorandom generator (PRG) and are secure against a malicious adversary corrupting an arbitrary number of parties. For a semihonest adversary, we get similar information-theoretic protocols for branching programs. - New NIOT constructions. Towards realizing OT correlations, we extend the DDH-based non-interactive OT (NIOT) protocol of Bellare and Micali (Crypto'89) to the malicious security model, and present new NIOT constructions from the Quadratic Residuosity Assumption (QRA) and the Learning With Errors (LWE) assumption. - Two-round black-box MPC with strong PKI setup. Combining the two previous results, we get two-round MPC protocols that make a black-box use of any DDH-hard or QRA-hard group. The protocols can offer security against a malicious adversary, and require a PKI setup that depends on the number of parties and the size of computation, but not on the inputs or the identities of the participating parties. - Two-round honest-majority MPC from secure channels. Given secure point-to-point channels, we get protocols that make a black-box use of a pseudorandom generator (PRG), as well as information-theoretic protocols for branching programs. These protocols can tolerate a semi-honest adversary corrupting a strict minority of the parties, where in the information-theoretic case the complexity is exponential in the number of parties.
引用
收藏
页码:123 / 151
页数:29
相关论文
共 50 条
  • [21] Round Optimal Black-Box "Commit-and-Prove"
    Khurana, Dakshita
    Ostrovsky, Rafail
    Srinivasan, Akshayaram
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 286 - 313
  • [22] Bilinear black-box identification and MPC of the activated sludge process
    Ekman, Mats
    JOURNAL OF PROCESS CONTROL, 2008, 18 (7-8) : 643 - 653
  • [23] INFORMATION-THEORETIC CORRECTIONS TO BLACK HOLE AREA QUANTISATION
    Parwani, Rajesh R.
    INTERNATIONAL JOURNAL OF MODERN PHYSICS A, 2009, 24 (18-19): : 3561 - 3563
  • [24] Information-theoretic matching of two point sets
    Wang, Y
    Woods, K
    McClain, M
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (08) : 868 - 872
  • [25] Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy
    Lucas, Christoph
    Raub, Dominik
    Maurer, Ueli
    PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2010, : 219 - 228
  • [26] Experimental comparison of two information-theoretic spectral estimators
    Papademetriou, RC
    ICSP '98: 1998 FOURTH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PROCEEDINGS, VOLS I AND II, 1998, : 141 - 144
  • [27] An information-theoretic approach for image reconstruction: The black and white case
    Golan, A
    Bhati, A
    Buyuksahin, B
    BAYESIAN INFERENCE AND MAXIMUM ENTROPY METHODS IN SCIENCE AND ENGINEERING, 2005, 803 : 223 - 230
  • [28] A survey of black-box modernization approaches for information systems
    Comella-Dorda, S
    Wallnau, K
    Seacord, RC
    Robert, J
    INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2000, : 173 - 183
  • [29] Black-box Adversarial Attacks with Limited Queries and Information
    Ilyas, Andrew
    Engstrom, Logan
    Athalye, Anish
    Lin, Jessy
    INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 80, 2018, 80
  • [30] Distributed Information-Theoretic Biclustering of Two Memoryless Sources
    Pichler, Georg
    Piantanida, Pablo
    Matz, Gerald
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 426 - 433