On the (in)efficiency of non-interactive secure multiparty computation

被引:0
|
作者
Maki Yoshida
Satoshi Obana
机构
[1] NICT,
[2] Hosei University,undefined
来源
关键词
Secure multi-party computation; Non-interactive; Information theoretical security; Communication complexity; Lower bound; 94A15; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Secure multi-party computation (MPC) enables multiple players to cooperatively evaluate various functions in the presence of adversaries. In this paper, we consider non-interactive MPC (NIMPC) against honest-but-curious adversaries in the information-theoretic setting, which was introduced by Beimel et al. at CRYPTO 2014. Their main focus is to realize stronger security while completely avoiding interaction, and succeeded to show that every function admits a fully robust NIMPC protocol. In this paper, we further develop the study of NIMPC. We first present a simple lower bound on the communication complexity derived from the correctness requirement of NIMPC. Secondly, we present an efficient NIMPC protocol for indicator functions, which is an important building block of NIMPC protocols. An NIMPC protocol for arbitrary functions is also constructed from the proposed NIMPC for indicator functions by using the generic compiler introduced by Beimel et al. in CRYPTO 2014. The communication complexities of NIMPC protocols presented in this paper are much more efficient than the previous ones. In fact, the gap between the lower and upper bounds of the communication complexity is reduced from exponential in the input length to quadratic. Finally, we show some improvements on the efficiency in the so-called offline-online model. Specifically, for some sets of functions, the exponential amount of offline communication reduces the online communication to almost optimum amount in the standard model.
引用
收藏
页码:1793 / 1805
页数:12
相关论文
共 50 条
  • [21] On Tightly Secure Non-Interactive Key Exchange
    Hesse, Julia
    Hofheinz, Dennis
    Kohl, Lisa
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 65 - 94
  • [22] Adaptively Secure Non-interactive Threshold Cryptosystems
    Libert, Benoit
    Yung, Moti
    Automata, Languages and Programming, ICALP, Pt II, 2011, 6756 : 588 - 600
  • [23] Secure Non-interactive Simulation: Feasibility and Rate
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 767 - 796
  • [24] Adaptively secure non-interactive threshold cryptosystems
    Libert, Benoit
    Yung, Moti
    THEORETICAL COMPUTER SCIENCE, 2013, 478 : 76 - 100
  • [25] Secure Multiparty Computation
    Lindell, Yehuda
    COMMUNICATIONS OF THE ACM, 2021, 64 (01) : 86 - 96
  • [26] Non-interactive Classical Verification of Quantum Computation
    Alagic, Gorjan
    Childs, Andrew M.
    Grilo, Alex B.
    Hung, Shih-Han
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT III, 2020, 12552 : 153 - 180
  • [27] Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
    Kumar V.
    Kumar R.
    Pandey S.K.
    International Journal of Information Technology, 2020, 12 (1) : 283 - 288
  • [28] Adaptively secure forward-secure non-interactive threshold cryptosystems
    Libert, Benoît
    Yung, Moti
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2012, 7537
  • [29] Secure Non-interactive Reduction and Spectral Analysis of Correlations
    Agarwal, Pratyush
    Narayanan, Varun
    Pathak, Shreya
    Prabhakaran, Manoj
    Prabhakaran, Vinod M.
    Rehan, Mohammad Ali
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III, 2022, 13277 : 797 - 827
  • [30] High Efficiency Secure Channels for a Secure Multiparty Computation Protocol Based on Signal
    Yang Y.
    Zhang R.
    Security and Communication Networks, 2023, 2023