On the (in)efficiency of non-interactive secure multiparty computation

被引:0
|
作者
Maki Yoshida
Satoshi Obana
机构
[1] NICT,
[2] Hosei University,undefined
来源
关键词
Secure multi-party computation; Non-interactive; Information theoretical security; Communication complexity; Lower bound; 94A15; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Secure multi-party computation (MPC) enables multiple players to cooperatively evaluate various functions in the presence of adversaries. In this paper, we consider non-interactive MPC (NIMPC) against honest-but-curious adversaries in the information-theoretic setting, which was introduced by Beimel et al. at CRYPTO 2014. Their main focus is to realize stronger security while completely avoiding interaction, and succeeded to show that every function admits a fully robust NIMPC protocol. In this paper, we further develop the study of NIMPC. We first present a simple lower bound on the communication complexity derived from the correctness requirement of NIMPC. Secondly, we present an efficient NIMPC protocol for indicator functions, which is an important building block of NIMPC protocols. An NIMPC protocol for arbitrary functions is also constructed from the proposed NIMPC for indicator functions by using the generic compiler introduced by Beimel et al. in CRYPTO 2014. The communication complexities of NIMPC protocols presented in this paper are much more efficient than the previous ones. In fact, the gap between the lower and upper bounds of the communication complexity is reduced from exponential in the input length to quadratic. Finally, we show some improvements on the efficiency in the so-called offline-online model. Specifically, for some sets of functions, the exponential amount of offline communication reduces the online communication to almost optimum amount in the standard model.
引用
收藏
页码:1793 / 1805
页数:12
相关论文
共 50 条
  • [31] SeED: Secure Non-Interactive Attestation for Embedded Devices
    Ibrahim, Ahmad
    Sadeghi, Ahmad-Reza
    Zeitouni, Shaza
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC 2017), 2017, : 64 - 74
  • [32] Multi-Client Non-interactive Verifiable Computation
    Choi, Seung Geol
    Katz, Jonathan
    Kumaresan, Ranjit
    Cid, Carlos
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 499 - 518
  • [33] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [34] Secure multiparty computation of DNF
    Peng, Kun
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [35] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [36] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [37] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [38] Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
    Boneh, Dan
    Glass, Darren
    Krashen, Daniel
    Lauter, Kristin
    Sharif, Shahed
    Silverberg, Alice
    Tibouchi, Mehdi
    Zhandry, Mark
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2020, 14 (01) : 5 - 14
  • [39] Secure Robust Hash Functions and Their Applications in Non-Interactive Communications
    Li, Qiming
    Roy, Sujoy
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2010, 2 (04) : 51 - 62
  • [40] Secure Non-interactive Simulation from Arbitrary Joint Distributions
    Khorasgani, Hamidreza Amini
    Maji, Hemanta K.
    Nguyen, Hai H.
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 378 - 407