Reusable Two-Round MPC from DDH

被引:8
|
作者
Bartusek, James [1 ]
Garg, Sanjam [1 ]
Masny, Daniel [2 ]
Mukherjee, Pratyay [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Visa Res, Palo Alto, CA USA
来源
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-64378-2_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a reusable two-round multi-party computation (MPC) protocol from the Decisional Diffie Hellman assumption (DDH). In particular, we show how to upgrade any secure two-round MPC protocol to allow reusability of its first message across multiple computations, using Homomorphic Secret Sharing (HSS) and pseudorandom functions in NC1-each of which can be instantiated from DDH. In our construction, if the underlying two-round MPC protocol is secure against semi-honest adversaries (in the plain model) then so is our reusable two-round MPC protocol. Similarly, if the underlying two-round MPC protocol is secure against malicious adversaries (in the common random/reference string model) then so is our reusable two-round MPC protocol. Previously, such reusable two-round MPC protocols were only known under assumptions on lattices. At a technical level, we show how to upgrade any two-round MPC protocol to a first message succinct two-round MPC protocol, where the first message of the protocol is generated independently of the computed circuit (though it is not reusable). This step uses homomorphic secret sharing (HSS) and low-depth pseudorandom functions. Next, we show a generic transformation that upgrades any first message succinct two-round MPC to allow for reusability of its first message.
引用
收藏
页码:320 / 348
页数:29
相关论文
共 50 条
  • [41] Minimizing the Two-Round Even-Mansour Cipher
    Chen, Shan
    Lampe, Rodolphe
    Lee, Jooyoung
    Seurin, Yannick
    Steinberger, John
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 39 - 56
  • [42] Two-Round Password-Based Authenticated Key Exchange from Lattices
    Yin, Anqi
    Guo, Yuanbo
    Song, Yuanming
    Qu, Tongzhou
    Fang, Chen
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [43] The French two-round system and party format: From extreme pluralism to concentration?
    Pappalardo, Adriano
    FRENCH POLITICS, 2010, 8 (04) : 377 - 401
  • [44] Composite Toffoli gate with two-round error detection
    Jones, Cody
    PHYSICAL REVIEW A, 2013, 87 (05):
  • [45] PriVeto: a fully private two-round veto protocol
    Bag, Samiran
    Azad, Muhammad Ajmal
    Hao, Feng
    IET INFORMATION SECURITY, 2019, 13 (04) : 311 - 320
  • [46] Two-round Multi-Party Contract Signing
    Li, Xiangdong
    Zheng, Qiusheng
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 486 - 489
  • [47] Cryptanalysis of two-round DES using genetic algorithms
    Song, Jun
    Zhang, Huanguo
    Meng, Qingshu
    Wang, Zhangyi
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2007, 4683 : 583 - +
  • [48] Quantum attacks on two-round even-mansour
    Cai, BinBin
    Gao, Fei
    Leander, Gregor
    FRONTIERS IN PHYSICS, 2022, 10
  • [49] Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round
    Zhao, X.
    Feng, D.
    IET INFORMATION SECURITY, 2010, 4 (03) : 167 - 184
  • [50] Voter Beliefs and Strategic Voting in Two-Round Elections
    Plutowski, Luke
    Weitz-Shapiro, Rebecca
    Winters, Matthew S.
    POLITICAL RESEARCH QUARTERLY, 2021, 74 (04) : 852 - 865