Two Round Information-Theoretic MPC with Malicious Security

被引:15
|
作者
Ananth, Prabhanjan [1 ]
Choudhuri, Arka Rai [2 ]
Goel, Aarushi [2 ]
Jain, Abhishek [2 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Johns Hopkins Univ, Baltimore, MD USA
关键词
MULTIPARTY COMPUTATION; PROTOCOLS;
D O I
10.1007/978-3-030-17656-3_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide the first constructions of two round information theoretic (IT) secure multiparty computation (MPC) protocols in the plain model that tolerate any t < n/2 malicious corruptions. Our protocols satisfy the strongest achievable standard notions of security in two rounds in different communication models. Previously, IT-MPC protocols in the plain model either required a larger number of rounds, or a smaller minority of corruptions.
引用
收藏
页码:532 / 561
页数:30
相关论文
共 50 条
  • [41] Information-theoretic analysis of security in side-informed data hiding
    Pérez-Freire, L
    Comesaña, P
    Pérez-González, F
    INFORMATION HIDING, 2005, 3727 : 131 - 145
  • [42] Quantum public-key encryption protocols with information-theoretic security
    Yang, Li
    Yang, Biyao
    Pan, Jiangyou
    QUANTUM OPTICS II, 2012, 8440
  • [43] Information-theoretic analysis of information hiding
    Moulin, P
    O'Sullivan, JA
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 19 - 19
  • [44] Information-theoretic analysis of information hiding
    Moulin, P
    O'Sullivan, JA
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (03) : 563 - 593
  • [45] DNA-Chip-Based Information Hiding Scheme Achieving Information-Theoretic Security
    Fang, Xiwen
    Lai, Xuejia
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2015, 12 (07) : 1402 - 1407
  • [46] Information-theoretic and set-theoretic similarity
    Cazzanti, Luca
    Gupta, Maya R.
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1836 - +
  • [47] Information-theoretic limits of control
    Touchette, H
    Lloyd, S
    PHYSICAL REVIEW LETTERS, 2000, 84 (06) : 1156 - 1159
  • [48] AN INFORMATION-THEORETIC FRAMEWORK FOR ROBUSTNESS
    MORGENTHALER, S
    HURVICH, C
    ANNALS OF THE INSTITUTE OF STATISTICAL MATHEMATICS, 1991, 43 (01) : 131 - 146
  • [49] INFORMATION-THEORETIC VIEW OF CONTROL
    Roy, Prateep
    Cela, Arben
    Hamam, Yskandar
    ICINCO 2009: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS, VOL 3, 2009, : 5 - +
  • [50] Notes on Information-Theoretic Privacy
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    2014 52ND ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2014, : 1272 - 1278