Simple and efficient perfectly-secure asynchronous MPC

被引:0
|
作者
Beerliova-Trubiniova, Zuzana [1 ]
Hirt, Martin [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
来源
关键词
multi-party computation; asynchronous; hybrid model; efficiency; perfect security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversary. Known asynchronous MPC protocols require communication of at least Omega(n(3)) (with cryptographic security), respectively Omega(n(4)) (with information-theoretic security, but with error probability and non-optimal resilience) field elements per multiplication. We present an asynchronous MPC protocol communicating O(n(3)) field elements per multiplication. Our protocol provides perfect security against an active, adaptive adversary corrupting t < n/4 players, which is optimal. This communication complexity is to be compared with the most efficient previously known protocol for the same model, which requires Omega(n(5)) field elements of communication (i.e., Omega(n(3)) broadcasts). Our protocol is as efficient as the most efficient perfectly secure protocol for the synchronous model and the most efficient asynchronous protocol with cryptographic security. Furthermore, we enhance our MPC protocol for a hybrid model. In the fully asynchronous model, up to t honest players might not be able to provide their input in the computation. In the hybrid model, all players are able to provide their input, given that the very first round of communication is synchronous. We provide an MPC protocol with communicating 0(n3) field elements per multiplication, where all players can provide their input if the first communication round turns out to be synchronous, and all but at most t players can provide their input if the communication is fully asynchronous. The protocol does not need to know whether or not the first communication round is synchronous, thus combining the advantages of the synchronous world and the asynchronous world. The proposed MPC protocol is the first protocol with this property.
引用
收藏
页码:376 / 392
页数:17
相关论文
共 50 条
  • [1] Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    PROCEEDINGS OF THE 2022 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, PODC 2022, 2022, : 92 - 102
  • [2] Perfectly-Secure Synchronous MPC With Asynchronous Fallback Guarantees
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2023, 69 (08) : 5386 - 5425
  • [3] Perfectly-Secure Asynchronous MPC for General Adversaries (Extended Abstract)
    Choudhury, Ashish
    Pappu, Nikhil
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 786 - 809
  • [4] Perfectly-secure MPC with linear communication complexity
    Beerliova-Trubiniova, Zuzana
    Hirt, Martin
    THEORY OF CRYPTOGRAPHY, 2008, 4948 : 213 - 230
  • [5] Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 184 - 202
  • [6] Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time
    Abraham, Ittai
    Asharov, Gilad
    Patil, Shravani
    Patra, Arpita
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT II, 2023, 14005 : 251 - 281
  • [7] The BGW protocol for perfectly-secure multiparty computation
    Asharov, Gilad
    Lindell, Yehuda
    Cryptology and Information Security Series, 2013, 10 : 120 - 167
  • [8] Perfectly-Secure Multiplication for Any t &lt; n/3
    Asharov, Gilad
    Lindell, Yehuda
    Rabin, Tal
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 240 - 258
  • [9] Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus
    Escudero, Daniel
    Song, Yifan
    Wang, Wenhao
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VI, 2025, 15489 : 102 - 132
  • [10] Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes
    Desmedt, Yvo
    Erotokritou, Stelios
    Safavi-Naini, Reihaneh
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 166 - +