Graph Design for Secure Multiparty Computation over Non-Abelian Groups
نویسندگان
چکیده
Recently, Desmedt et al. studied the problem of achieving secure nparty computation over non-Abelian groups. They considered the passive adversary model and they assumed that the parties were only allowed to perform black-box operations over the finite group G. They showed three results for the n-product function fG(x1, . . . , xn) := x1 · x2 · . . . · xn, where the input of party Pi is xi ∈ G for i ∈ {1, . . . , n}. First, if t ≥ ⌈n2 ⌉ then it is impossible to have a t-private protocol computing fG. Second, they demonstrated that one could t-privately compute fG for any t ≤ ⌈n2 ⌉−1 in exponential communication cost. Third, they constructed a randomized algorithm with O(n t) communication complexity for any t < n 2.948 . In this paper, we extend these results in two directions. First, we use percolation theory to show that for any fixed ǫ > 0, one can design a randomized algorithm for any t ≤ n 2+ǫ using O(n) communication complexity, thus nearly matching the known upper bound ⌈ 2 ⌉ − 1. This is the first time that percolation theory is used for multiparty computation. Second, we exhibit a deterministic construction having polynomial communication cost for any t = O(n) (again for any fixed ǫ > 0). Our results extend to the more general function e fG(x1, . . . , xm) := x1 · x2 · . . . · xm where m ≥ n and each of the n parties holds one or more input values.
منابع مشابه
A subexponential construction of graph coloring for multiparty computation
We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box nonAbelian groups which is both optimal (secure against an adversary who possesses any t < n2 inputs) and has subexponential complexity of construction based on coloring of planar graphs. More specifically, following the result of Desmed...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملSecure Multiparty Computation
A function is private if there exists a protocol that is secure; that is, no party can learn any additional information about the other parties’ inputs other than what follows from their own input and the function’s output. Previous studies have investigated multiparty computation with broadcast communication, but broadcast communication does not fully capture all secure multiparty protocols. W...
متن کاملActive Security in Multiparty Computation over Black-Box Groups
Most previous work on unconditionally secure multiparty computation has focused on computing over a nite eld (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty ...
متن کاملEfficient Secure Comparison Protocols
A secure comparison protocol allows players to evaluate the greater-than predicate on hidden values; it addresses a problem that belongs to the field of multiparty computation, in which players wish to jointly and privately evaluate a function on secret inputs. Introduced by Yao under the name millionaires’ problem, secure comparison has received a great deal of attention. It has proven to be a...
متن کامل