Reusable Two-Round MPC from DDH

被引:8
|
作者
Bartusek, James [1 ]
Garg, Sanjam [1 ]
Masny, Daniel [2 ]
Mukherjee, Pratyay [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Visa Res, Palo Alto, CA USA
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-64378-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a reusable two-round multi-party computation (MPC) protocol from the Decisional Diffie Hellman assumption (DDH). In particular, we show how to upgrade any secure two-round MPC protocol to allow reusability of its first message across multiple computations, using Homomorphic Secret Sharing (HSS) and pseudorandom functions in NC1-each of which can be instantiated from DDH. In our construction, if the underlying two-round MPC protocol is secure against semi-honest adversaries (in the plain model) then so is our reusable two-round MPC protocol. Similarly, if the underlying two-round MPC protocol is secure against malicious adversaries (in the common random/reference string model) then so is our reusable two-round MPC protocol. Previously, such reusable two-round MPC protocols were only known under assumptions on lattices. At a technical level, we show how to upgrade any two-round MPC protocol to a first message succinct two-round MPC protocol, where the first message of the protocol is generated independently of the computed circuit (though it is not reusable). This step uses homomorphic secret sharing (HSS) and low-depth pseudorandom functions. Next, we show a generic transformation that upgrades any first message succinct two-round MPC to allow for reusability of its first message.
引用
收藏
页码:320 / 348
页数:29
相关论文
共 50 条
  • [21] Two-Round PAKE from Approximate SPH and Instantiations from Lattices
    Zhang, Jiang
    Yu, Yu
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 37 - 67
  • [22] Two-round Multiparty Secure Computation from Minimal Assumptions
    Garg, Sanjam
    Srinivasan, Akshayaram
    JOURNAL OF THE ACM, 2022, 69 (05)
  • [23] Identifying the bandwagon effect in two-round elections
    Áron Kiss
    Gábor Simonovits
    Public Choice, 2014, 160 : 327 - 344
  • [24] On the Security of Two-Round Multi-Signatures
    Drijvers, Manu
    Edalatnejad, Kasra
    Ford, Bryan
    Kiltz, Eike
    Loss, Julian
    Neven, Gregory
    Stepanovs, Igors
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1084 - 1101
  • [25] Identifying the bandwagon effect in two-round elections
    Kiss, Aron
    Simonovits, Gabor
    PUBLIC CHOICE, 2014, 160 (3-4) : 327 - 344
  • [26] Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions
    Benhamouda, Fabrice
    Lin, Huijia
    Polychroniadou, Antigoni
    Venkitasubramaniam, Muthuramakrishnan
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 175 - 205
  • [27] Tuning a two-round group key agreement
    Gao, Weizheng
    Neupane, Kashi
    Steinwandt, Rainer
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (05) : 467 - 476
  • [28] Identifying strategic voting in two-round elections
    Kiss, Aron
    ELECTORAL STUDIES, 2015, 40 : 127 - 135
  • [29] Two-Round Diagnosability Measures for Multiprocessor Systems
    Liang, Jiarong
    Zhang, Qian
    Li, Changzhen
    COMPLEXITY, 2020, 2020
  • [30] Two-round elections, one-round determinants? Evidence from the French municipal elections
    Cassette, Aurelie
    Farvaque, Etienne
    Hericourt, Jerome
    PUBLIC CHOICE, 2013, 156 (3-4) : 563 - 591