Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation

被引:0
|
作者
Arpita Patra
Ashish Choudhury
C. Pandu Rangan
机构
[1] University of Bristol,Department of Computer Science
[2] Indian Institute of Technology Madras,Department of Computer Science and Engineering
来源
Journal of Cryptology | 2015年 / 28卷
关键词
Unconditional security; Fault tolerance; Communication complexity;
D O I
暂无
中图分类号
学科分类号
摘要
Secure Multi-Party Computation (MPC) providing information-theoretic security allows a set of n parties to securely compute an agreed function over a finite field, even if t parties are under the control of a computationally unbounded active adversary. Asynchronous MPC (AMPC) is an important variant of MPC, which works over an asynchronous network. It is well known that perfect AMPC is possible if and only if t<n/4, while statistical AMPC is possible if and only if t<n/3. In this paper, we study the communication complexity of AMPC protocols (both statistical and perfect) designed with exactly n=4t+1 parties. Our major contributions in this paper are as follows:Asynchronous Verifiable Secret Sharing (AVSS) is one of the main building blocks for AMPC protocols. In this paper, we design two AVSS schemes with 4t+1 parties: the first one is statistically-secure and has non-optimal resilience, while the second one is perfectly-secure and has optimal resilience. Both these schemes achieve a common interesting property, which was not achieved by the previous schemes. Specifically, our AVSS schemes allow to share a secret with the degree of sharing at most d, where t≤d≤2t. In contrast, the existing AVSS schemes allow the degree of sharing to be at most t. The new property of our AVSS schemes simplifies the degree-reduction step for the evaluation of multiplication gates in an AMPC protocol.Using our statistical AVSS scheme, we design a statistical AMPC protocol with n=4t+1 which requires an amortized communication of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathcal {O}(n^{2})$\end{document} field elements per multiplication gate. Though this protocol has non-optimal resilience, it significantly improves the communication complexity of the existing statistical AMPC protocols.We then present a perfect AMPC protocol with n=4t+1 (using our perfect AVSS scheme), which also incurs an amortized communication of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\mathcal{O}(n^{2})$\end{document} field elements per multiplication gate. This protocol improves on our statistical AMPC protocol as it has optimal resilience. This is the most communication efficient, optimally-resilient, perfect AMPC protocol.
引用
收藏
页码:49 / 109
页数:60
相关论文
共 50 条
  • [41] DNA Algorithm of Verifiable Secret Sharing
    Liu Feng
    Gao Dong-Mei
    [J]. 2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 244 - 246
  • [42] Dynamic and Verifiable Hierarchical Secret Sharing
    Traverso, Giulia
    Demirel, Denise
    Buchmann, Johannes
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2016, 2016, 10015 : 24 - 43
  • [43] On codes, matroids, and secure multiparty computation from linear secret-sharing schemes
    Cramer, Ronald
    Daza, Vanesa
    Gracia, Ignacio
    Urroz, Jorge Jimenez
    Leander, Gregor
    Marti-Farre, Jaume
    Padro, Carles
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2644 - 2657
  • [44] Quantum secret sharing between multiparty and multiparty with four states
    FengLi Yan
    Ting Gao
    YouCheng Li
    [J]. Science in China Series G: Physics, Mechanics and Astronomy, 2007, 50 : 572 - 580
  • [45] Verifiable threshold secret sharing and full fair secure two-party computation
    School of Computer Science and Technology, Harbin Institute of Technology, Haerbin, China
    不详
    不详
    [J]. Proc. Int. e-Conf. Adv. Sci. Technol., AST, 1600, (78-83):
  • [46] Verifiable Threshold Secret Sharing and Full Fair Secure Two-party Computation
    Ye Jian-wei
    Jiao Xu-lu
    Zhang Yong-zheng
    [J]. AST: 2009 INTERNATIONAL E-CONFERENCE ON ADVANCED SCIENCE AND TECHNOLOGY, PROCEEDINGS, 2009, : 78 - +
  • [47] Quantum secret sharing between multiparty and multiparty without entanglement
    Yan, FL
    Gao, T
    [J]. PHYSICAL REVIEW A, 2005, 72 (01)
  • [49] Quantum secret sharing between multiparty and multiparty with four states
    YAN FengLi1
    2 College of Mathematics and Information Science
    [J]. Science China(Physics,Mechanics & Astronomy), 2007, (05) : 572 - 580
  • [50] Quantum secret sharing between multiparty and multiparty with four states
    Fengli, Yan
    Ting, Gao
    YouCheng, Li
    [J]. SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2007, 50 (05): : 572 - 580