Reusable Two-Round MPC from DDH

被引:8
|
作者
Bartusek, James [1 ]
Garg, Sanjam [1 ]
Masny, Daniel [2 ]
Mukherjee, Pratyay [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Visa Res, Palo Alto, CA USA
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-64378-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a reusable two-round multi-party computation (MPC) protocol from the Decisional Diffie Hellman assumption (DDH). In particular, we show how to upgrade any secure two-round MPC protocol to allow reusability of its first message across multiple computations, using Homomorphic Secret Sharing (HSS) and pseudorandom functions in NC1-each of which can be instantiated from DDH. In our construction, if the underlying two-round MPC protocol is secure against semi-honest adversaries (in the plain model) then so is our reusable two-round MPC protocol. Similarly, if the underlying two-round MPC protocol is secure against malicious adversaries (in the common random/reference string model) then so is our reusable two-round MPC protocol. Previously, such reusable two-round MPC protocols were only known under assumptions on lattices. At a technical level, we show how to upgrade any two-round MPC protocol to a first message succinct two-round MPC protocol, where the first message of the protocol is generated independently of the computed circuit (though it is not reusable). This step uses homomorphic secret sharing (HSS) and low-depth pseudorandom functions. Next, we show a generic transformation that upgrades any first message succinct two-round MPC to allow for reusability of its first message.
引用
收藏
页码:320 / 348
页数:29
相关论文
共 50 条
  • [1] Reusable Two-Round MPC from LPN
    Bartusek, James
    Garg, Sanjam
    Srinivasan, Akshayaram
    Zhang, Yinuo
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 165 - 193
  • [2] Two-Round Secure MPC from Indistinguishability Obfuscation
    Garg, Sanjam
    Gentry, Craig
    Halevi, Shai
    Raykova, Mariana
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 74 - 94
  • [3] Broadcast-Optimal Two-Round MPC
    Cohen, Ran
    Garay, Juan
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 828 - 858
  • [4] Garbled Protocols and Two-Round MPC from Bilinear Maps
    Garg, Sanjam
    Srinivasan, Akshayaram
    2017 IEEE 58TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2017, : 588 - 599
  • [5] Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
    Garg, Sanjam
    Polychroniadou, Antigoni
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 614 - 637
  • [6] Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH
    Alamati, Navid
    Montgomery, Hart
    Patranabis, Sikhar
    Sarkar, Pratik
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 305 - 334
  • [7] Two-Round MPC: Information-Theoretic and Black-Box
    Garg, Sanjam
    Ishai, Yuval
    Srinivasan, Akshayaram
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 123 - 151
  • [8] Two-Round MPC Without Round Collapsing Revisited - Towards Efficient Malicious Protocols
    Lin, Huijia
    Liu, Tianren
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 353 - 382
  • [9] On Communication Models and Best-Achievable Security in Two-Round MPC
    Goel, Aarushi
    Jain, Abhishek
    Prabhakaran, Manoj
    Raghunath, Rajeev
    THEORY OF CRYPTOGRAPHY, TCC 2021, PT II, 2021, 13043 : 97 - 128
  • [10] Dishonest Majority Constant-Round MPC with Linear Communication from DDH
    Goyal, Vipul
    Li, Junru
    Misra, Ankit Kumar
    Ostrovsky, Rafail
    Song, Yifan
    Weng, Chenkai
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VI, 2025, 15489 : 167 - 199