Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography

被引:0
|
作者
Damgard, Ivan [1 ]
Ishai, Yuval [2 ,3 ]
Kroigaard, Mikkel [4 ]
机构
[1] Univ Aarhus, DK-8000 Aarhus, Denmark
[2] Technion, Haifa, Israel
[3] Univ Calif Los Angeles, Los Angeles, CA 90095 USA
[4] Tech Univ Eindhoven, Eindhoven, Netherlands
来源
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study the following two related questions: - What are the minimal computational resources required for general secure multiparty computation in the presence of an honest majority? - What are the minimal resources required for two-party primitives such as zero-knowledge proofs and general secure two-party computation? We obtain a nearly tight answer to the first question by presenting a perfectly secure protocol which allows p, players to evaluate an arithmetic circuit of size s by performing a total of O(s log s log(2) n) arithmetic operations, plus all additive term which depends (polynomially) On n and the circuit depth, but only logarithmically On S. Thus, for typical large-scale computations whose circuit; width is much bigger than their depth and the number of players, the amortized overhead is just polylogarithmic in It and s. The protocol provides perfect security with guaranteed output delivery in the presence of an active, adaptive adversary corrupting a (1/3 -epsilon ) fraction of the players, for an arbitrary constant epsilon > 0 and sufficiently large n. The best previous protocols in this setting could only offer computational security with a computational overhead of poly(k, log n, logs), where k is a computational security parameter, or perfect security with a computational overhead of O(n log n). We then apply the above result towards making progress on the second question. Concretely, under standard cryptographic assumptions, we obtain zero-knowledge proofs for circuit satisfiability with 2(-k) soundness error in which the amortized computational overhead per gate is only polylogarithmic in k, improving over the omega(k) overhead of the best previous protocols. Under stronger cryptographic assumptions, we obtain similar results for general secure two-party computation.
引用
收藏
页码:445 / +
页数:4
相关论文
共 50 条
  • [31] Secure Multiparty Computation Goes Live
    Bogetoft, Peter
    Christensen, Dan Lund
    Damgard, Ivan
    Geisler, Martin
    Jakobsen, Thomas
    Kroigaard, Mikkel
    Nielsen, Janus Dam
    Nielsen, Jesper Buns
    Nielsen, Jurt
    Pagter, Jakob
    Schwartzbach, Michael
    Toft, Tomas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 325 - +
  • [32] Secure Multiparty Computation with Sublinear Preprocessing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    Nof, Ariel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 427 - 457
  • [33] Secure Multiparty Computation Using Secure Virtual Machines
    Miladinovic, Danko
    Milakovic, Adrian
    Vukasovic, Maja
    Stanisavljevic, Zarko
    Vuletic, Pavle
    ELECTRONICS, 2024, 13 (05)
  • [34] On the Message Complexity of Secure Multiparty Computation
    Ishai, Yuval
    Mittal, Manika
    Ostrovsky, Rafail
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 698 - 711
  • [35] Practical applications of secure multiparty computation
    Talviste, Riivo
    Cryptology and Information Security Series, 2015, 13 : 246 - 251
  • [36] Secure multiparty computation in cloud computing
    Jiang H.
    Xu Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2152 - 2162
  • [37] Basic constructions of secure multiparty computation
    Laud, Peeter
    Pankova, Alisa
    Kamm, Liina
    Veeningen, Meilof
    Cryptology and Information Security Series, 2015, 13 : 1 - 25
  • [38] Secure multiparty computation for comparator networks
    Morohashi, Gembu
    Chida, Koji
    Hirota, Keiichi
    Kikuchi, Hiroaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2349 - 2355
  • [39] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [40] Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography
    Coutinho, Murilo
    Albuquerque, Robson de Oliveira
    Borges, Fabio
    Garcia Villalba, Luis Javier
    Kim, Tai-Hoon
    SENSORS, 2018, 18 (05)