Minimal Complete Primitives for Secure Multi-Party Computation

被引:0
|
作者
Matthias Fitzi
Juan A. Garay
Ueli Maurer
Rafail Ostrovsky
机构
[1] Department of Computer Science,
[2] University of California,undefined
[3] Davis,undefined
[4] CA 95616,undefined
[5] Bell Labs – Lucent Technologies,undefined
[6] 600 Mountain Ave.,undefined
[7] Murray Hill,undefined
[8] NJ 07974,undefined
[9] Department of Computer Science,undefined
[10] ETH,undefined
[11] CH-8096 Zurich,undefined
[12] Telcordia Technologies Inc.,undefined
[13] 445 South Street,undefined
[14] Morristown,undefined
[15] NJ 07960-6438,undefined
来源
Journal of Cryptology | 2005年 / 18卷
关键词
Multi-party computation; Secure function evaluation; Unconditional security; Complete functions; Oblivious cast;
D O I
暂无
中图分类号
学科分类号
摘要
The study of minimal cryptographic primitives needed to implement secure computation among two or more players is a fundamental question in cryptography. The issue of complete primitives for the case of two players has been thoroughly studied. However, in the multi-party setting, when there are n > 2 players and t of them are corrupted, the question of what are the simplest complete primitives remained open for t ≥ n/3. (A primitive is called complete if any computation can be carried out by the players having access only to the primitive and local computation.) In this paper we consider this question, and introduce complete primitives of minimal cardinality for secure multi-party computation. The cardinality issue (number of players accessing the primitive) is essential in settings where primitives are implemented by some other means, and the simpler the primitive the easier it is to realize. We show that our primitives are complete and of minimal cardinality possible for most cases.
引用
收藏
页码:37 / 61
页数:24
相关论文
共 50 条
  • [41] Secure Key Management for Multi-Party Computation in MOZAIK
    Marque, Enzo
    Moeyersons, Jerico
    Pohle, Erik
    Van Kenhove, Michiel
    Abidin, Aysajan
    Volckaert, Bruno
    2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 133 - 140
  • [42] Fair and Secure Multi-Party Computation with Cheater Detection
    Seo, Minhye
    CRYPTOGRAPHY, 2021, 5 (03)
  • [43] Recent Advances in Practical Secure Multi-Party Computation
    Ohata, Satsuya
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (10) : 1134 - 1141
  • [44] Secure Multi-Party Computation with Service Contract Automata
    Basile, Davide
    ERCIM NEWS, 2021, (126): : 32 - 33
  • [45] Rabbit: Efficient Comparison for Secure Multi-Party Computation
    Makri, Eleftheria
    Rotaru, Dragos
    Vercauteren, Frederik
    Wagh, Sameer
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 : 249 - 270
  • [46] Secure multi-party computation protocol for sequencing problem
    Tang ChunMing
    Shi GuiHua
    Yao ZhengAn
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1654 - 1662
  • [47] Quorum-based secure multi-party computation
    Beaver, D
    Wool, A
    ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 375 - 390
  • [48] Secure Multi-Party Computation: Theory, practice and applications
    Zhao, Chuan
    Zhao, Shengnan
    Zhao, Minghao
    Chen, Zhenxiang
    Gao, Chong-Zhi
    Li, Hongwei
    Tan, Yu-an
    INFORMATION SCIENCES, 2019, 476 : 357 - 372
  • [49] Adaptively Secure Multi-Party Computation with Dishonest Majority
    Garg, Sanjam
    Sahai, Amit
    ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 : 105 - 123
  • [50] Round-Optimal Secure Multi-Party Computation
    Halevi, Shai
    Hazay, Carmit
    Polychroniadou, Antigoni
    Venkitasubramaniam, Muthuramakrishnan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 488 - 520