Simple and efficient perfectly-secure asynchronous MPC

被引:0
|
作者
Beerliova-Trubiniova, Zuzana [1 ]
Hirt, Martin [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
来源
关键词
multi-party computation; asynchronous; hybrid model; efficiency; perfect security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversary. Known asynchronous MPC protocols require communication of at least Omega(n(3)) (with cryptographic security), respectively Omega(n(4)) (with information-theoretic security, but with error probability and non-optimal resilience) field elements per multiplication. We present an asynchronous MPC protocol communicating O(n(3)) field elements per multiplication. Our protocol provides perfect security against an active, adaptive adversary corrupting t < n/4 players, which is optimal. This communication complexity is to be compared with the most efficient previously known protocol for the same model, which requires Omega(n(5)) field elements of communication (i.e., Omega(n(3)) broadcasts). Our protocol is as efficient as the most efficient perfectly secure protocol for the synchronous model and the most efficient asynchronous protocol with cryptographic security. Furthermore, we enhance our MPC protocol for a hybrid model. In the fully asynchronous model, up to t honest players might not be able to provide their input in the computation. In the hybrid model, all players are able to provide their input, given that the very first round of communication is synchronous. We provide an MPC protocol with communicating 0(n3) field elements per multiplication, where all players can provide their input if the first communication round turns out to be synchronous, and all but at most t players can provide their input if the communication is fully asynchronous. The protocol does not need to know whether or not the first communication round is synchronous, thus combining the advantages of the synchronous world and the asynchronous world. The proposed MPC protocol is the first protocol with this property.
引用
收藏
页码:376 / 392
页数:17
相关论文
共 50 条
  • [21] Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees
    Deligios, Giovanni
    Liu-Zhang, Chen-Da
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2023, PT I, 2024, 13950 : 77 - 93
  • [22] On Communication-Efficient Asynchronous MPC with Adaptive Security
    Chopard, Annick
    Hirt, Martin
    Liu-Zhang, Chen-Da
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT II, 2021, 13043 : 35 - 65
  • [23] Efficient perfectly secure message transmission in synchronous networks
    Sayeed, HM
    AbuAmara, H
    INFORMATION AND COMPUTATION, 1996, 126 (01) : 53 - 61
  • [24] Towards optimal and efficient perfectly secure message transmission
    Fitzi, Matthias
    Franklin, Matthew
    Garay, Juan
    Vardhan, S. Harsha
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2007, 4392 : 311 - +
  • [25] Efficient Protocols for Perfectly Secure Message Transmission With Applications to Secure Network Coding
    Spini, Gabriele
    Zemor, Gilles
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (10) : 6340 - 6353
  • [26] Insured MPC: Efficient Secure Computation with Financial Penalties
    Baum, Carsten
    David, Bernardo
    Dowsley, Rafael
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020, 2020, 12059 : 404 - 420
  • [27] Efficient Secure Multiparty Computation Protocol in Asynchronous Network
    Huang, Zheng
    Qiu, Weidong
    Li, Qiang
    Chen, Kefei
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 152 - 158
  • [28] Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries
    Appan, Ananya
    Chandramouli, Anirudh
    Choudhury, Ashish
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2022, 2022, 13774 : 223 - 248
  • [29] Efficient Perfectly Reliable and Secure Message Transmission tolerating mobile adversary
    Patra, Arpita
    Choudhary, Ashish
    Vaidyanathan, Madhu
    Rangan, C. Pandu
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 170 - 186
  • [30] SIMPLE, EFFICIENT, ASYNCHRONOUS PARALLEL ALGORITHMS FOR MAXIMIZATION
    GREENBERG, AG
    LUBACHEVSKY, BD
    ODLYZKO, AM
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1988, 10 (02): : 313 - 337