Secure Multiparty Computation with Free Branching

被引:0
|
作者
Goel, Aarushi [1 ]
Hall-Andersen, Mathias [2 ]
Hegde, Aditya [1 ]
Jain, Abhishek [1 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Aarhus Univ, Aarhus, Denmark
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-031-06944-4_14
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We study secure multi-party computation (MPC) protocols for branching circuits that contain multiple sub-circuits (i.e., branches) and the output of the circuit is that of single "active" branch. Crucially, the identity of the active branch must remain hidden from the protocol participants. While such circuits can be securely computed by evaluating each branch and then multiplexing the output, such an approach incurs a communication cost linear in the size of the entire circuit. To alleviate this, a series of recent works have investigated the problem of reducing the communication cost of branching executions inside MPC (without relying on fully homomorphic encryption). Most notably, the stacked garbling paradigm [Heath and Kolesnikov, CRYPTO'20] yields garbled circuits for branching circuits whose size only depends on the size of the largest branch. Presently, however, it is not known how to obtain similar communication improvements for secure computation involving more than two parties. In this work, we provide a generic framework for branching multi-party computation that supports any number of parties. The communication complexity of our scheme is proportional to the size of the largest branch and the computation is linear in the size of the entire circuit. We provide an implementation and benchmarks to demonstrate practicality of our approach.
引用
收藏
页码:397 / 426
页数:30
相关论文
共 50 条
  • [1] Secure Multiparty Computation
    Lindell, Yehuda
    [J]. COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [2] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    [J]. International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [3] Secure multiparty computation of DNF
    Peng, Kun
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [4] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    [J]. ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [5] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [6] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [7] Better Preprocessing for Secure Multiparty Computation
    Baum, Carsten
    Damgard, Ivan
    Toft, Tomas
    Zakarias, Rasmus
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 327 - 345
  • [8] Analysis of Data in Secure Multiparty Computation
    Shaikh, Zulfa
    Puntambekar, D. M.
    Pathak, Pushpa
    Bhati, Dinesh
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 731 - 733
  • [9] Absentia: Secure Multiparty Computation on Ethereum
    Demirag, Didem
    Clark, Jeremy
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, 2021, 12676 : 381 - 396
  • [10] Secure Multiparty Computation with Minimal Interaction
    Ishai, Yuval
    Kushilevitz, Eyal
    Paskin-Cherniavsky, Anat
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 577 - 594