Broadcast-Optimal Two Round MPC with an Honest Majority

نویسندگان

چکیده

This paper closes the question of possibility two-round MPC protocols achieving different security guarantees with and without availability broadcast in any given round. Cohen et al. [CGZ20] study this dishonest majority setting; we complete picture by studying honest setting. In setting, both rounds, it is known that strongest guarantee—guaranteed output delivery—is achievable [GLS15]. We show that, first round only, guaranteed delivery still achievable. Given second give a new construction achieves identifiable abort, fairness—and thus delivery—are not Finally, if only peer-to-peer channels are available, weakest guarantee—selective abort—is one for corruption thresholds $$t> 1$$ $$t=1$$ $$n=3$$ . On other hand, already selective abort can be achieved these cases. remaining cases, i.e., $$t= $$n\ge 4$$ , [IKP10, IKKP15] (and all weaker guarantees) possible.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linear Overhead Robust MPC with Honest Majority Using Preprocessing

We present a technique to achieve O(n) communication complexity per multiplication for a wide class of robust practical MPC protocols. Previously such a communication complexity was only known in the case of non-robust protocols in the full threshold, dishonest majority setting. In particular our technique applies to robust threshold computationally secure protocols in the case of t < n/2 in th...

متن کامل

Round Optimal Concurrent MPC via Strong Simulation

In this paper, we study the round complexity of concurrently secure multi-party computation (MPC) with super-polynomial simulation (SPS) in the plain model. In the plain model, there are known explicit attacks that show that concurrently secure MPC with polynomial simulation is impossible to achieve; SPS security is the most widely studied model for concurrently secure MPC in the plain model. W...

متن کامل

Information-Theoretic Security Without an Honest Majority

We present six multiparty protocols with information-theoretic security that tolerate an arbitrary number of corrupt participants. All protocols assume pairwise authentic private channels and a broadcast channel (in a single case, we require a simultaneous broadcast channel). We give protocols for veto, vote, anonymous bit transmission, collision detection, notification and anonymous message tr...

متن کامل

Identifying Cheaters without an Honest Majority

Motivated by problems in secure multiparty computation (MPC), we study a natural extension of identifiable secret sharing to the case where an arbitrary number of players may be corrupted. An identifiable secret sharing scheme is a secret sharing scheme in which the reconstruction algorithm, after receiving shares from all players, either outputs the correct secret or publicly identifies the se...

متن کامل

Two-Round Secure MPC from Indistinguishability Obfuscation

One fundamental complexity measure of an MPC protocol is its round complexity. Asharov et al. recently constructed the first three-round protocol for general MPC in the CRS model. Here, we show how to achieve this result with only two rounds. We obtain UC security with abort against static malicious adversaries, and fairness if there is an honest majority. Additionally the communication in our ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-030-84245-1_6