Unconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication Per Multiplication Gate
نویسندگان
چکیده
Secure multiparty computation (MPC) allows a set of n parties to securely compute an agreed function, even if up to t parties are under the control of an adversary. In this paper, we propose a new Asynchronous secure multiparty computation (AMPC) protocol that provides information theoretic security with n = 4t+ 1, where t out of n parties can be under the influence of a Byzantine (active) adversary At having unbounded computing power. Our protocol communicates O(n 2 log |F|) bits per multiplication gate and involves a negligible error probability of 2, where κ is the error parameter and F is the field over which the computation is carried out. The best known information theoretically secure AMPC with n = 4t+1 communicates O(n log |F|) bits per multiplication and does not involve any error probability in computation. Though a negligible error probability is involved, our AMPC protocol provides the best communication complexity among all the known AMPC protocols providing information theoretic security. Moreover, the communication complexity of our AMPC is same as the communication complexity of the best known AMPC protocol with cryptographic assumptions. As a tool for our AMPC protocol, we propose a new method of efficiently generating d-sharing of multiple secrets concurrently in asynchronous setting, where t ≤ d ≤ 2t. In the literature, though there are protocols for generating t-sharing and 2t-sharing separately, there is no generic protocol for generating d-sharing for the range t ≤ d ≤ 2t. Comparing our protocol with the existing protocols for generating t-sharing and 2t-sharing, we find that: (i) our protocol requires no extra cost in communication complexity in comparison to the best known method for generating t-sharing; (ii) it provides better communication complexity than the existing methods for generating 2t-sharing.
منابع مشابه
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity
We present two unconditionally secure asynchronous multiparty computation (AMPC) protocols among nparties with an amortized communication complexity of O(n) field elements per multiplication gate and whichcan tolerate a computationally unbounded active adversary corrupting t < n/4 parties. These are the first AMPCprotocols with linear communication complexity per multiplication gate...
متن کاملRound Efficient Unconditionally Secure Multiparty Computation Protocol
In this paper, we propose a round efficient unconditionally secure multiparty computation (UMPC) protocol in information theoretic model with n > 2t players, in the absence of any physical broadcast channel, which communicates O(n4) field elements per multiplication and requires O(n log(n) + D) rounds, even if up to t players are under the control of an active adversary having unbounded computi...
متن کاملNear-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority
In the setting of unconditionally-secure MPC, where dishonest players are unbounded and no cryptographic assumptions are used, it was known since the 1980’s that an honest majority of players is both necessary and sufficient to achieve privacy and correctness, assuming secure point-to-point and broadcast channels. The main open question that was left is to establish the exact communication comp...
متن کاملMultiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithmetic circuits over any finite field Fpk . Our protocol consists of a preprocessing phase that is both independent of the function to be computed and of the inputs, and a much more efficient online phase where the actual...
متن کاملRound and Communication Efficient Unconditionally-secure MPC with t < n/3 in Partially Synchronous Network
In this work, we study unconditionally-secure multi-party computation (MPC) tolerating t < n/3 corruptions, where n is the total number of parties involved. In this setting, it is well known that if the underlying network is completely asynchronous, then one can achieve only statistical security; moreover it is impossible to ensure input provision and consider inputs of all the honest parties. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009