Reusable Two-Round MPC from DDH

被引:8
|
作者
Bartusek, James [1 ]
Garg, Sanjam [1 ]
Masny, Daniel [2 ]
Mukherjee, Pratyay [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Visa Res, Palo Alto, CA USA
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-64378-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a reusable two-round multi-party computation (MPC) protocol from the Decisional Diffie Hellman assumption (DDH). In particular, we show how to upgrade any secure two-round MPC protocol to allow reusability of its first message across multiple computations, using Homomorphic Secret Sharing (HSS) and pseudorandom functions in NC1-each of which can be instantiated from DDH. In our construction, if the underlying two-round MPC protocol is secure against semi-honest adversaries (in the plain model) then so is our reusable two-round MPC protocol. Similarly, if the underlying two-round MPC protocol is secure against malicious adversaries (in the common random/reference string model) then so is our reusable two-round MPC protocol. Previously, such reusable two-round MPC protocols were only known under assumptions on lattices. At a technical level, we show how to upgrade any two-round MPC protocol to a first message succinct two-round MPC protocol, where the first message of the protocol is generated independently of the computed circuit (though it is not reusable). This step uses homomorphic secret sharing (HSS) and low-depth pseudorandom functions. Next, we show a generic transformation that upgrades any first message succinct two-round MPC to allow for reusability of its first message.
引用
收藏
页码:320 / 348
页数:29
相关论文
共 50 条
  • [31] Two-round elections, one-round determinants? Evidence from the French municipal elections
    Aurélie Cassette
    Etienne Farvaque
    Jérôme Héricourt
    Public Choice, 2013, 156 : 563 - 591
  • [32] Tuning a two-round group key agreement
    Weizheng Gao
    Kashi Neupane
    Rainer Steinwandt
    International Journal of Information Security, 2014, 13 : 467 - 476
  • [33] Anonymous voting by two-round public discussion
    Hao, F.
    Ryan, P. Y. A.
    Zielinski, P.
    IET INFORMATION SECURITY, 2010, 4 (02) : 62 - 67
  • [34] Minimizing the Two-Round Even–Mansour Cipher
    Shan Chen
    Rodolphe Lampe
    Jooyoung Lee
    Yannick Seurin
    John Steinberger
    Journal of Cryptology, 2018, 31 : 1064 - 1119
  • [35] One-round vs Two-round Elections: An Experimental Study
    André Blais
    Jean-François Laslier
    Annie Laurent
    Nicolas Sauger
    Karine Van der Straeten
    French Politics, 2007, 5 (3) : 278 - 286
  • [36] One-round vs Two-round Elections: An Experimental Study
    Blais, Andre
    Laslier, Jean-Francois
    Laurent, Annie
    Sauger, Nicolas
    Van der Straeten, Karine
    FRENCH POLITICS, 2007, 5 (03) : 278 - 286
  • [37] Lessons Learned from a Two-Round Delphi-based Scenario Study
    Schmalz, Ulrike
    Spinler, Stefan
    Ringbeck, Jurgen
    METHODSX, 2021, 8
  • [38] The effect of two-round presidential elections on human rights
    Holzer, Joshua
    PLOS ONE, 2020, 15 (12):
  • [39] Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT
    Ishai, Yuval
    Khurana, Dakshita
    Sahai, Amit
    Srinivasan, Akshayaram
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 441 - 469
  • [40] Minimizing the Two-Round Even-Mansour Cipher
    Chen, Shan
    Lampe, Rodolphe
    Lee, Jooyoung
    Seurin, Yannick
    Steinberger, John
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 1064 - 1119