Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation

被引:0
|
作者
Arpita Patra
Ashish Choudhury
C. Pandu Rangan
机构
[1] University of Bristol,Department of Computer Science
[2] Indian Institute of Technology Madras,Department of Computer Science and Engineering
来源
Journal of Cryptology | 2015年 / 28卷
关键词
Unconditional security; Fault tolerance; Communication complexity;
D O I
暂无
中图分类号
学科分类号
摘要
Secure Multi-Party Computation (MPC) providing information-theoretic security allows a set of n parties to securely compute an agreed function over a finite field, even if t parties are under the control of a computationally unbounded active adversary. Asynchronous MPC (AMPC) is an important variant of MPC, which works over an asynchronous network. It is well known that perfect AMPC is possible if and only if t<n/4, while statistical AMPC is possible if and only if t<n/3. In this paper, we study the communication complexity of AMPC protocols (both statistical and perfect) designed with exactly n=4t+1 parties. Our major contributions in this paper are as follows:Asynchronous Verifiable Secret Sharing (AVSS) is one of the main building blocks for AMPC protocols. In this paper, we design two AVSS schemes with 4t+1 parties: the first one is statistically-secure and has non-optimal resilience, while the second one is perfectly-secure and has optimal resilience. Both these schemes achieve a common interesting property, which was not achieved by the previous schemes. Specifically, our AVSS schemes allow to share a secret with the degree of sharing at most d, where t≤d≤2t. In contrast, the existing AVSS schemes allow the degree of sharing to be at most t. The new property of our AVSS schemes simplifies the degree-reduction step for the evaluation of multiplication gates in an AMPC protocol.Using our statistical AVSS scheme, we design a statistical AMPC protocol with n=4t+1 which requires an amortized communication of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathcal {O}(n^{2})$\end{document} field elements per multiplication gate. Though this protocol has non-optimal resilience, it significantly improves the communication complexity of the existing statistical AMPC protocols.We then present a perfect AMPC protocol with n=4t+1 (using our perfect AVSS scheme), which also incurs an amortized communication of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathcal{O}(n^{2})$\end{document} field elements per multiplication gate. This protocol improves on our statistical AMPC protocol as it has optimal resilience. This is the most communication efficient, optimally-resilient, perfect AMPC protocol.
引用
收藏
页码:49 / 109
页数:60
相关论文
共 50 条
  • [31] Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy
    Peng, Kun
    Bao, Feng
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5932 : 118 - 132
  • [32] Space-Efficient Verifiable Secret Sharing Using Polynomial Interpolation
    Cafaro, Massimo
    Pelle, Piergiuseppe
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 453 - 463
  • [33] Asynchronous Multiparty Computation: Theory and Implementation
    Damgard, Ivan
    Geisler, Martin
    Kroigaard, Mikkel
    Nielsen, Jesper Buus
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 160 - 179
  • [34] Multiparty verification in image secret sharing
    Yan, Xuehu
    Li, Junhao
    Pan, Zulie
    Zhong, Xiaofeng
    Yang, Guozheng
    [J]. INFORMATION SCIENCES, 2021, 562 : 475 - 490
  • [35] Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (01) : 51 - 63
  • [36] Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation
    Kikuchi, Ryo
    Chida, Koji
    Ikarashi, Dai
    Hamada, Koki
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 179 - 196
  • [37] Publicly verifiable function secret sharing
    Wang, Qiang
    Zhou, Fucai
    Peng, Su
    Xu, Jian
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (04) : 526 - 535
  • [38] Verifiable Secret Redistribution for Proactive Secret Sharing Schemes
    于佳
    孔凡玉
    李大兴
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 236 - 241
  • [39] Computational Verifiable Secret Sharing Revisited
    Backes, Michael
    Kate, Aniket
    Patra, Arpita
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 590 - 609
  • [40] Verifiable secret sharing and time capsules
    Pieprzyk, J
    Okamoto, E
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 169 - 183