Simple and efficient perfectly-secure asynchronous MPC

被引:0
|
作者
Beerliova-Trubiniova, Zuzana [1 ]
Hirt, Martin [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, CH-8092 Zurich, Switzerland
来源
关键词
multi-party computation; asynchronous; hybrid model; efficiency; perfect security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure multi-party computation (MPC) allows a set of n players to securely compute an agreed function of their inputs, even when up to t players are under the control of an adversary. Known asynchronous MPC protocols require communication of at least Omega(n(3)) (with cryptographic security), respectively Omega(n(4)) (with information-theoretic security, but with error probability and non-optimal resilience) field elements per multiplication. We present an asynchronous MPC protocol communicating O(n(3)) field elements per multiplication. Our protocol provides perfect security against an active, adaptive adversary corrupting t < n/4 players, which is optimal. This communication complexity is to be compared with the most efficient previously known protocol for the same model, which requires Omega(n(5)) field elements of communication (i.e., Omega(n(3)) broadcasts). Our protocol is as efficient as the most efficient perfectly secure protocol for the synchronous model and the most efficient asynchronous protocol with cryptographic security. Furthermore, we enhance our MPC protocol for a hybrid model. In the fully asynchronous model, up to t honest players might not be able to provide their input in the computation. In the hybrid model, all players are able to provide their input, given that the very first round of communication is synchronous. We provide an MPC protocol with communicating 0(n3) field elements per multiplication, where all players can provide their input if the first communication round turns out to be synchronous, and all but at most t players can provide their input if the communication is fully asynchronous. The protocol does not need to know whether or not the first communication round is synchronous, thus combining the advantages of the synchronous world and the asynchronous world. The proposed MPC protocol is the first protocol with this property.
引用
收藏
页码:376 / 392
页数:17
相关论文
共 50 条
  • [41] Round-efficient perfectly secure message transmission scheme against general adversary
    Kaoru Kurosawa
    Designs, Codes and Cryptography, 2012, 63 : 199 - 207
  • [42] Round-efficient perfectly secure message transmission scheme against general adversary
    Kurosawa, Kaoru
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 63 (02) : 199 - 207
  • [43] PERFECTLY SIMPLE AUDITS
    SMITH, C
    BRITISH JOURNAL OF GENERAL PRACTICE, 1991, 41 (346): : 218 - 218
  • [44] Perfectly secure message transmission revisited
    Wang, Yongge
    Desmedt, Yvo
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2582 - 2595
  • [45] Perfectly Secure Oblivious Priority Queue
    Ichikawa, Atsunori
    Ogata, Wakaha
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2023, E106A (03) : 272 - 280
  • [46] Perfectly Secure Encryption of Individual Sequences
    Merhav, Neri
    2012 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2012,
  • [47] Perfectly Secure Oblivious Parallel RAM
    Chan, T-H Hubert
    Nayak, Kartik
    Shi, Elaine
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT II, 2018, 11240 : 636 - 668
  • [48] Perfectly secure message transmission revisited
    Desmedt, Y
    Wang, Y
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 502 - 517
  • [49] Optimal perfectly secure message transmission
    Srinathan, K
    Narayanan, A
    Rangan, CP
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 545 - 561
  • [50] On Proactive perfectly secure message transmission
    Srinathan, Karman
    Raghavendra, Prasad
    Chandrasekaran, Pandu Rangan
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 461 - +