Round-Optimal Secure Multi-party Computation

被引:0
|
作者
Shai Halevi
Carmit Hazay
Antigoni Polychroniadou
Muthuramakrishnan Venkitasubramaniam
机构
[1] Algorand Foundation,
[2] Bar-Ilan University,undefined
[3] J.P. Morgan AI Research,undefined
[4] University of Rochester,undefined
来源
Journal of Cryptology | 2021年 / 34卷
关键词
Secure multi-party computation; Garbled circuits; Round complexity; Additive errors;
D O I
暂无
中图分类号
学科分类号
摘要
Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of their private inputs where security should hold in the presence of an active (i.e. malicious) adversary that can corrupt any number of parties. Despite extensive research, the precise round complexity of this “standard-bearer” cryptographic primitive, under polynomial-time hardness assumptions, is unknown. Recently, Garg, Mukherjee, Pandey and Polychroniadou, in Eurocrypt 2016 demonstrated that the round complexity of any MPC protocol relying on black-box proofs of security in the plain model must be at least four. Following this work, independently Ananth, Choudhuri and Jain, CRYPTO 2017 and Brakerski, Halevi, and Polychroniadou, TCC 2017 made progress towards solving this question and constructed four-round protocols based on the DDH and LWE assumptions, respectively, albeit with super-polynomial hardness. More recently, Ciampi, Ostrovsky, Siniscalchi and Visconti in TCC 2017 closed the gap for two-party protocols by constructing a four-round protocol from polynomial-time assumptions, concretely, trapdoor permutations. In another work, Ciampi, Ostrovsky, Siniscalchi and Visconti TCC 2017 showed how to design a four-round multi-party protocol for the specific case of multi-party coin-tossing based on one-way functions. In this work, we resolve this question by designing a four-round actively secure multi-party (two or more parties) protocol for general functionalities under standard polynomial-time hardness assumptions with a black-box proof of security, specifically, under the assumptions LWE, DDH, QR and DCR.
引用
下载
收藏
相关论文
共 50 条
  • [21] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [22] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [23] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
  • [24] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [25] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
  • [26] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [27] Social rational secure multi-party computation
    Wang, Yilei
    Liu, Zhe
    Wang, Hao
    Xu, Qiuliang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
  • [28] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [29] Malicious Computation Prevention Protocol for Secure Multi-Party Computation
    Mishra, Durgesh Kumar
    Koria, Neha
    Kapoor, Nikhil
    Bahety, Ravish
    TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
  • [30] Round-Optimal Black-Box Two-Party Computation
    Ostrovsky, Rafail
    Richelson, Silas
    Scafuro, Alessandra
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 339 - 358