Round-Optimal Secure Multi-party Computation

被引:0
|
作者
Shai Halevi
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
机构
[1] Algorand Foundation,
[2] Bar-Ilan University,undefined
[3] J.P. Morgan AI Research,undefined
[4] University of Rochester,undefined
来源
Journal of Cryptology | 2021年 / 34卷
关键词
Secure multi-party computation; Garbled circuits; Round complexity; Additive errors;
D O I
暂无
中图分类号
学科分类号
摘要
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of their private inputs where security should hold in the presence of an active (i.e. malicious) adversary that can corrupt any number of parties. Despite extensive research, the precise round complexity of this “standard-bearer” cryptographic primitive, under polynomial-time hardness assumptions, is unknown. Recently, Garg, Mukherjee, Pandey and Polychroniadou, in Eurocrypt 2016 demonstrated that the round complexity of any MPC protocol relying on black-box proofs of security in the plain model must be at least four. Following this work, independently Ananth, Choudhuri and Jain, CRYPTO 2017 and Brakerski, Halevi, and Polychroniadou, TCC 2017 made progress towards solving this question and constructed four-round protocols based on the DDH and LWE assumptions, respectively, albeit with super-polynomial hardness. More recently, Ciampi, Ostrovsky, Siniscalchi and Visconti in TCC 2017 closed the gap for two-party protocols by constructing a four-round protocol from polynomial-time assumptions, concretely, trapdoor permutations. In another work, Ciampi, Ostrovsky, Siniscalchi and Visconti TCC 2017 showed how to design a four-round multi-party protocol for the specific case of multi-party coin-tossing based on one-way functions. In this work, we resolve this question by designing a four-round actively secure multi-party (two or more parties) protocol for general functionalities under standard polynomial-time hardness assumptions with a black-box proof of security, specifically, under the assumptions LWE, DDH, QR and DCR.
引用
下载
收藏
相关论文
共 50 条
  • [11] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [12] Information theory and secure multi-party computation
    Maurer, UM
    1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [13] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [14] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [15] Secure multi-party computation made simple
    Maurer, U
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [16] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [17] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287
  • [18] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [19] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [20] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630