Broadcast-Optimal Two Round MPC with an Honest Majority
نویسندگان
چکیده
This paper closes the question of possibility two-round MPC protocols achieving different security guarantees with and without availability broadcast in any given round. Cohen et al. [CGZ20] study this dishonest majority setting; we complete picture by studying honest setting. In setting, both rounds, it is known that strongest guarantee—guaranteed output delivery—is achievable [GLS15]. We show that, first round only, guaranteed delivery still achievable. Given second give a new construction achieves identifiable abort, fairness—and thus delivery—are not Finally, if only peer-to-peer channels are available, weakest guarantee—selective abort—is one for corruption thresholds $$t> 1$$ $$t=1$$ $$n=3$$ . On other hand, already selective abort can be achieved these cases. remaining cases, i.e., $$t= $$n\ge 4$$ , [IKP10, IKKP15] (and all weaker guarantees) possible.
منابع مشابه
Linear Overhead Robust MPC with Honest Majority Using Preprocessing
We present a technique to achieve O(n) communication complexity per multiplication for a wide class of robust practical MPC protocols. Previously such a communication complexity was only known in the case of non-robust protocols in the full threshold, dishonest majority setting. In particular our technique applies to robust threshold computationally secure protocols in the case of t < n/2 in th...
متن کاملRound Optimal Concurrent MPC via Strong Simulation
In this paper, we study the round complexity of concurrently secure multi-party computation (MPC) with super-polynomial simulation (SPS) in the plain model. In the plain model, there are known explicit attacks that show that concurrently secure MPC with polynomial simulation is impossible to achieve; SPS security is the most widely studied model for concurrently secure MPC in the plain model. W...
متن کاملInformation-Theoretic Security Without an Honest Majority
We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel). We give protocols for veto, vote, anonymous bit transmission, collision detection, notification and anonymous message tr...
متن کاملIdentifying Cheaters without an Honest Majority
Motivated by problems in secure multiparty computation (MPC), we study a natural extension of identifiable secret sharing to the case where an arbitrary number of players may be corrupted. An identifiable secret sharing scheme is a secret sharing scheme in which the reconstruction algorithm, after receiving shares from all players, either outputs the correct secret or publicly identifies the se...
متن کاملTwo-Round Secure MPC from Indistinguishability Obfuscation
One fundamental complexity measure of an MPC protocol is its round complexity. Asharov et al. recently constructed the first three-round protocol for general MPC in the CRS model. Here, we show how to achieve this result with only two rounds. We obtain UC security with abort against static malicious adversaries, and fairness if there is an honest majority. Additionally the communication in our ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2021
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-030-84245-1_6