Reusable Two-Round MPC from DDH

被引:8
|
作者
Bartusek, James [1 ]
Garg, Sanjam [1 ]
Masny, Daniel [2 ]
Mukherjee, Pratyay [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Visa Res, Palo Alto, CA USA
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-64378-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a reusable two-round multi-party computation (MPC) protocol from the Decisional Diffie Hellman assumption (DDH). In particular, we show how to upgrade any secure two-round MPC protocol to allow reusability of its first message across multiple computations, using Homomorphic Secret Sharing (HSS) and pseudorandom functions in NC1-each of which can be instantiated from DDH. In our construction, if the underlying two-round MPC protocol is secure against semi-honest adversaries (in the plain model) then so is our reusable two-round MPC protocol. Similarly, if the underlying two-round MPC protocol is secure against malicious adversaries (in the common random/reference string model) then so is our reusable two-round MPC protocol. Previously, such reusable two-round MPC protocols were only known under assumptions on lattices. At a technical level, we show how to upgrade any two-round MPC protocol to a first message succinct two-round MPC protocol, where the first message of the protocol is generated independently of the computed circuit (though it is not reusable). This step uses homomorphic secret sharing (HSS) and low-depth pseudorandom functions. Next, we show a generic transformation that upgrades any first message succinct two-round MPC to allow for reusability of its first message.
引用
收藏
页码:320 / 348
页数:29
相关论文
共 50 条
  • [11] Two-Round Oblivious Transfer from CDH or LPN
    Doettling, Nico
    Garg, Sanjam
    Hajiabadi, Mohammad
    Masny, Daniel
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 768 - 797
  • [12] Two-Round Witness Hiding Protocol
    Niu, Qihua
    Yan, Tongjiang
    Sun, Yuhua
    Zhao, Chun'e
    Tang, Fei
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (06) : 953 - 960
  • [13] Nash Equilibria of Two-round Auctions
    Zhong, Chulong
    Yan, Xiang
    Wang, Yuyi
    Huang, Shuangping
    Zhong, Jin
    2023 5TH INTERNATIONAL CONFERENCE ON DISTRIBUTED ARTIFICIAL INTELLIGENCE, DAI 2023, 2023,
  • [14] Understanding two-round differentials in AES
    Daemen, Joan
    Rijmen, Vincent
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 78 - 94
  • [15] Polylogarithmic two-round argument systems
    Mie, Thilo
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2008, 2 (04) : 343 - 363
  • [16] Two-round electoral systems and democracy
    Birch, S
    COMPARATIVE POLITICAL STUDIES, 2003, 36 (03) : 319 - 344
  • [17] Two-Round Oblivious Linear Evaluation from Learning with Errors
    Branco, Pedro
    Doettling, Nico
    Mateus, Paulo
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 379 - 408
  • [18] Two-Round Multi-Signatures from Okamoto Signatures
    Lee, Kwangsu
    Kim, Hyoseung
    MATHEMATICS, 2023, 11 (14)
  • [19] Two-Round Man-in-the-Middle Security from LPN
    Cash, David
    Kiltz, Eike
    Tessaro, Stefano
    THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I, 2016, 9562 : 225 - 248
  • [20] Two-Round Multiparty Secure Computation from Minimal Assumptions
    Garg, Sanjam
    Srinivasan, Akshayaram
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 468 - 499