Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience

被引:0
|
作者
Patra, Arpita [1 ]
Choudhary, Ashish [1 ]
Rangan, C. Pandu [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Madras 600036, Tamil Nadu, India
关键词
Multiparty Computation; Information Theoretic Security; Error Probability; COMPUTATION; PROTOCOL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In information theoretic model, unconditionally secure multiparty computation (UMPC) allows a set of n parties to securely compute an agreed function f, even upto t < n/2 parties are under the control of an active adversary having unbounded computing power. The bound on the resilience/fault tolerance (i.e t < n/2) is optimal, as long as each party is connected with every other party by a secure channel and a common physical broadcast channel is available to the parties and a negligible error probability of 2(-Omega(kappa)) (for some security parameter n) is allowed in the computation. Any.UMPC protocol designed under the above settings is called as optimally resilient UMPC protocol. In this paper, we propose an optimally resilient UMPC protocol with n = 2t + 1, which requires only 0(D) rounds, where D is the multiplicative depth of the arithmetic circuit representing f. To the best of our knowledge, our protocol is the first UMPC protocol with optimal resilience, to attain a round complexity that is independent of n. When 7, is constant, then our protocol requires only constant number of rounds. Our protocol is to be compared with the most round efficient, optimally resilient, UMPC protocol of [16] that requires O(log n D) rounds in the same settings as ours.' Thus our UMPC significantly reduces the round complexity of [16]. Moreover, our UMPC protocol requires the same communication complexity as that of [16]. As a tool for designing our UMPC protocol; we propose a new and robust multiplication protocol to generate t-sharing of the product of two t-shared secrets. As an interesting, practically-on-demand MPC problem, we present a protocol for unconditionally secure multiparty set intersection (UMPSI) with optimal resilience; i.e., with n = 2t + 1, having a negligible error probability in correctness. This protocol adapts the techniques used in our proposed general UMPC protocol. The protocol takes constant number rounds, incurs a private communication of 0(m(2)n(4 kappa)) bits and broadcasts 0((m(2)n(4) + n(5))kappa) bits, where each party has a set of size m. To the best of our knowledge, this is the first ever UMPSI protocol with n = 2t + 1. This solves an open problem posed in [15] and [17], urging to design an UMPSI protocol with 71 = 2t + 1. Our UMPSI protocol is to be compared with the best known UMPSI protocol of [17] with n = 3t + 1 (i.e., non-optimal resilience), which takes constant number rounds, incurs a private communication of 0((m(2)n(3) + n(4)kappa)kappa) bits and broadcasts O((m(2)n(3) + n(4) kappa)kappa) bits. So even though the communication complexity of our UMPSI protocol is slightly larger than that of [1.7], our UMPS1 protocol significantly improves the resilience of UMPSI protocol of [17]; i.e.; from t < n/3 to t < n/2.
引用
收藏
页码:398 / 417
页数:20
相关论文
共 35 条
  • [1] Round Efficient Unconditionally Secure Multiparty Computation Protocol
    Patra, Arpita
    Choudhary, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 185 - 199
  • [2] SECURE AND EFFICIENT MULTIPARTY PRIVATE SET INTERSECTION CARDINALITY
    Debnath, Sumit Kumar
    Stanica, Pantelimon
    Kundu, Nibedita
    Choudhury, Tanmay
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, 15 (02) : 365 - 386
  • [3] An Efficient Framework for Unconditionally Secure Multiparty Computation
    Choudhury, Ashish
    Patra, Arpita
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (01) : 428 - 468
  • [4] An unconditionally secure protocol for multi-party set intersection
    Li, Ronghua
    Wu, Chuankun
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 226 - +
  • [5] Round and Communication Efficient Unconditionally-Secure MPC with t &lt; n/3 in Partially Synchronous Network
    Choudhury, Ashish
    Patra, Arpita
    Ravi, Divya
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 : 83 - 109
  • [6] Quantum Protocol for Secure Multiparty Logical AND With Application to Multiparty Private Set Intersection Cardinality
    Shi, Run-Hua
    Li, Yi-Fei
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (12) : 5206 - 5218
  • [7] Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 184 - 202
  • [8] Efficient Multiparty Probabilistic Threshold Private Set Intersection
    Liu, Feng-Hao
    Zhang, En
    Qin, Leiyong
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 2188 - 2201
  • [9] EMPSI: Efficient multiparty private set intersection (with cardinality)
    Yunbo Yang
    Xiaolei Dong
    Zhenfu Cao
    Jiachen Shen
    Ruofan Li
    Yihao Yang
    Shangmin Dou
    [J]. Frontiers of Computer Science, 2024, 18
  • [10] EMPSI: Efficient multiparty private set intersection (with cardinality)
    Yang, Yunbo
    Dong, Xiaolei
    Cao, Zhenfu
    Shen, Jiachen
    Li, Ruofan
    Yang, Yihao
    Dou, Shangmin
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (01)