Two Round Information-Theoretic MPC with Malicious Security

被引:15
|
作者
Ananth, Prabhanjan [1 ]
Choudhuri, Arka Rai [2 ]
Goel, Aarushi [2 ]
Jain, Abhishek [2 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Johns Hopkins Univ, Baltimore, MD USA
关键词
MULTIPARTY COMPUTATION; PROTOCOLS;
D O I
10.1007/978-3-030-17656-3_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide the first constructions of two round information theoretic (IT) secure multiparty computation (MPC) protocols in the plain model that tolerate any t < n/2 malicious corruptions. Our protocols satisfy the strongest achievable standard notions of security in two rounds in different communication models. Previously, IT-MPC protocols in the plain model either required a larger number of rounds, or a smaller minority of corruptions.
引用
收藏
页码:532 / 561
页数:30
相关论文
共 50 条
  • [1] Two-Round MPC: Information-Theoretic and Black-Box
    Garg, Sanjam
    Ishai, Yuval
    Srinivasan, Akshayaram
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 123 - 151
  • [2] Information-Theoretic 2-Round MPC Without Round Collapsing: Adaptive Security, and More
    Lin, Huijia
    Liu, Tianren
    Wee, Hoeteck
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 502 - 531
  • [3] Best Possible Information-Theoretic MPC
    Halevi, Shai
    Ishai, Yuval
    Kushilevitz, Eyal
    Rabin, Tal
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 255 - 281
  • [4] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [5] Information-Theoretic Security with Asymmetries
    Beyne, Tim
    Chen, Yu Long
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 463 - 494
  • [6] Universal Hashing for Information-Theoretic Security
    Tyagi, Himanshu
    Vardy, Alexander
    PROCEEDINGS OF THE IEEE, 2015, 103 (10) : 1781 - 1795
  • [7] Wireless Information-Theoretic Security in MANETs
    Chrysikos, Theofilos
    Dagiuklas, Tasos
    Kotsopoulos, Stavros
    Dagiuklas, Tasos
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (IEEE ICC), 2013, : 692 - 696
  • [8] Information-Spectrum Methods for Information-Theoretic Security
    Bloch, Matthieu
    Laneman, J. Nicholas
    2009 INFORMATION THEORY AND APPLICATIONS WORKSHOP, 2009, : 20 - 25
  • [9] Dynamic Information-Theoretic Measures for Security Informatics
    Colbaugh, Richard
    Glass, Kristin
    Bauer, Travis
    2013 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: BIG DATA, EMERGENT THREATS, AND DECISION-MAKING IN SECURITY INFORMATICS, 2013, : 45 - 49
  • [10] Mosaics of combinatorial designs for information-theoretic security
    Wiese, Moritz
    Boche, Holger
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (03) : 593 - 632