Round-Optimal Secure Multi-party Computation

被引:0
|
作者
Shai Halevi
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
机构
[1] Algorand Foundation,
[2] Bar-Ilan University,undefined
[3] J.P. Morgan AI Research,undefined
[4] University of Rochester,undefined
来源
Journal of Cryptology | 2021年 / 34卷
关键词
Secure multi-party computation; Garbled circuits; Round complexity; Additive errors;
D O I
暂无
中图分类号
学科分类号
摘要
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of their private inputs where security should hold in the presence of an active (i.e. malicious) adversary that can corrupt any number of parties. Despite extensive research, the precise round complexity of this “standard-bearer” cryptographic primitive, under polynomial-time hardness assumptions, is unknown. Recently, Garg, Mukherjee, Pandey and Polychroniadou, in Eurocrypt 2016 demonstrated that the round complexity of any MPC protocol relying on black-box proofs of security in the plain model must be at least four. Following this work, independently Ananth, Choudhuri and Jain, CRYPTO 2017 and Brakerski, Halevi, and Polychroniadou, TCC 2017 made progress towards solving this question and constructed four-round protocols based on the DDH and LWE assumptions, respectively, albeit with super-polynomial hardness. More recently, Ciampi, Ostrovsky, Siniscalchi and Visconti in TCC 2017 closed the gap for two-party protocols by constructing a four-round protocol from polynomial-time assumptions, concretely, trapdoor permutations. In another work, Ciampi, Ostrovsky, Siniscalchi and Visconti TCC 2017 showed how to design a four-round multi-party protocol for the specific case of multi-party coin-tossing based on one-way functions. In this work, we resolve this question by designing a four-round actively secure multi-party (two or more parties) protocol for general functionalities under standard polynomial-time hardness assumptions with a black-box proof of security, specifically, under the assumptions LWE, DDH, QR and DCR.
引用
下载
收藏
相关论文
共 50 条
  • [1] Round-Optimal Secure Multi-Party Computation
    Halevi, Shai
    Hazay, Carmit
    Polychroniadou, Antigoni
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 488 - 520
  • [2] Round-Optimal Secure Multi-party Computation
    Halevi, Shai
    Hazay, Carmit
    Polychroniadou, Antigoni
    Venkitasubramaniam, Muthuramakrishnan
    JOURNAL OF CRYPTOLOGY, 2021, 34 (03)
  • [3] Round-Optimal Multi-party Computation with Identifiable Abort
    Ciampi, Michele
    Ravi, Divya
    Siniscalchi, Luisa
    Waldner, Hendrik
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 335 - 364
  • [4] Round-optimal secure two-party computation
    Katz, J
    Ostrovsky, R
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 335 - 354
  • [5] Round-Optimal Secure Two-Party Computation from Trapdoor Permutations
    Ciampi, Michele
    Ostrovsky, Rafail
    Siniscalchi, Luisa
    Visconti, Ivan
    THEORY OF CRYPTOGRAPHY, TCC 2017, PT I, 2017, 10677 : 678 - 710
  • [6] Round Efficient Computationally Secure Multi-party Computation Revisited
    Bangalore, Laasya
    Choudhury, Ashish
    Garimella, Gayathri
    ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2019, : 292 - 301
  • [7] Round-optimal and abuse-free optimistic multi-party contract signing
    Baum-Waidner, B
    Waidner, M
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 524 - 535
  • [8] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [9] A New Approach to Round-Optimal Secure Multiparty Computation
    Ananth, Prabhanjan
    Choudhuri, Arka Rai
    Jain, Abhishek
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 468 - 499
  • [10] Round-Optimal Secure Multiparty Computation with Honest Majority
    Ananth, Prabhanjan
    Choudhuri, Arka Rai
    Goel, Aarushi
    Jain, Abhishek
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 395 - 424