On the (in)efficiency of non-interactive secure multiparty computation

被引:0
|
作者
Maki Yoshida
Satoshi Obana
机构
[1] NICT,
[2] Hosei University,undefined
来源
关键词
Secure multi-party computation; Non-interactive; Information theoretical security; Communication complexity; Lower bound; 94A15; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Secure multi-party computation (MPC) enables multiple players to cooperatively evaluate various functions in the presence of adversaries. In this paper, we consider non-interactive MPC (NIMPC) against honest-but-curious adversaries in the information-theoretic setting, which was introduced by Beimel et al. at CRYPTO 2014. Their main focus is to realize stronger security while completely avoiding interaction, and succeeded to show that every function admits a fully robust NIMPC protocol. In this paper, we further develop the study of NIMPC. We first present a simple lower bound on the communication complexity derived from the correctness requirement of NIMPC. Secondly, we present an efficient NIMPC protocol for indicator functions, which is an important building block of NIMPC protocols. An NIMPC protocol for arbitrary functions is also constructed from the proposed NIMPC for indicator functions by using the generic compiler introduced by Beimel et al. in CRYPTO 2014. The communication complexities of NIMPC protocols presented in this paper are much more efficient than the previous ones. In fact, the gap between the lower and upper bounds of the communication complexity is reduced from exponential in the input length to quadratic. Finally, we show some improvements on the efficiency in the so-called offline-online model. Specifically, for some sets of functions, the exponential amount of offline communication reduces the online communication to almost optimum amount in the standard model.
引用
收藏
页码:1793 / 1805
页数:12
相关论文
共 50 条
  • [41] Non-Interactive and Secure Data Aggregation Scheme for Internet of Things
    Fu, Yanxia
    Ren, Yanli
    Feng, Guorui
    Zhang, Xinpeng
    Qin, Chuan
    ELECTRONICS, 2021, 10 (20)
  • [42] Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes
    C. Blundo
    B. Masucci
    D. R. Stinson
    R. Wei
    Designs, Codes and Cryptography, 2002, 26 : 97 - 110
  • [43] Provably secure non-interactive key distribution based on pairings
    Dupont, R
    Enge, A
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 270 - 276
  • [44] Constructions and bounds for unconditionally secure non-interactive commitment schemes
    Blundo, C
    Masucci, B
    Stinson, DR
    Wei, R
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 26 (1-3) : 97 - 110
  • [45] Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
    Gennaro, Rosario
    Gentry, Craig
    Parno, Bryan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 465 - 482
  • [46] Discourse structure and performance efficiency in interactive and non-interactive spoken modalities
    Oviatt, Sharon L.
    Cohen, Philip R.
    Computer Speech and Language, 1991, 5 (04): : 297 - 326
  • [47] Better Preprocessing for Secure Multiparty Computation
    Baum, Carsten
    Damgard, Ivan
    Toft, Tomas
    Zakarias, Rasmus
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 327 - 345
  • [48] Secure Multiparty Computation with Minimal Interaction
    Ishai, Yuval
    Kushilevitz, Eyal
    Paskin-Cherniavsky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 577 - 594
  • [49] Absentia: Secure Multiparty Computation on Ethereum
    Demirag, Didem
    Clark, Jeremy
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, 2021, 12676 : 381 - 396
  • [50] Analysis of Data in Secure Multiparty Computation
    Shaikh, Zulfa
    Puntambekar, D. M.
    Pathak, Pushpa
    Bhati, Dinesh
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 731 - 733