Efficient Asynchronous Multiparty Computation with Optimal Resilience
نویسندگان
چکیده
We propose an efficient information theoretic secure asynchronous multiparty computation (AMPC)protocol with optimal fault tolerance; i.e., with n = 3t + 1, where n is the total number of parties andt is the number of parties that can be under the influence of a Byzantine (active) adversaryAt havingunbounded computing power. Our protocol communicates O(n5κ) bits per multiplication and involvesa negligible error probability of 2−O(κ), where κ is the error parameter. As far as our knowledge isconcerned, the only known AMPC protocol with n = 3t+1 providing information theoretic security withnegligible error probability is due to [9], which communicates Ω(nκ) bits and A-Casts Ω(nκ log(n))bits per multiplication. Here A-Cast is an asynchronous broadcast primitive, which allows a party tosend the same information to all other parties identically. Thus our AMPC protocol shows significantimprovement in communication complexity over the AMPC protocol of [9]. As a tool for our AMPCprotocol, we introduce a new asynchronous primitive called Asynchronous Complete Verifiable SecretSharing (ACVSS), which is first of its kind and is of independent interest. For designing our ACVSS,we employ a new asynchronous verifiable secret sharing (AVSS) protocol which is better than all knowncommunication-efficient AVSS protocols with n = 3t + 1.
منابع مشابه
Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience
We consider secure multi-party computation in the asynchronous model and present an efficient protocol with optimal resilience. For n parties, up to t < n/3 of them being corrupted, and security parameter κ, a circuit with c gates can be securely computed with communication complexity O(cnκ) bits. In contrast to all previous asynchronous protocols with optimal resilience, our protocol requires ...
متن کاملScalable Multiparty Computation with Nearly Optimal Work and Resilience
We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmically with n (ignoring an additive term that depends on n but not on the complexity of f). Moreover, the protocol is also nearly optimal in terms of resilience, providing computational security against an active, adaptiv...
متن کاملAsynchronous Perfectly Secure Computation Tolerating Generalized Adversaries
We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than n4 active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we sh...
متن کاملRound Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience
In information theoretic model, unconditionally secure multiparty computation (UMPC) allows a set of n parties to securely compute an agreed function f , even upto t < n/2 parties are under the control of an active adversary having unbounded computing power. The bound on the resilience/fault tolerance (i.e t < n/2 ) is optimal, as long as each party is connected with every other party by a secu...
متن کاملEfficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience
Verifiable Secret Sharing (VSS) is a fundamental primitive used as a building block in many distributed cryptographic tasks, such as Secure Multiparty Computation (MPC) and Byzantine Agreement (BA). An important variant of VSS is Asynchronous VSS (AVSS) which is designed to work over asynchronous networks. AVSS is a two phase (Sharing, Reconstruction) protocol carried out among n parties in the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2008 شماره
صفحات -
تاریخ انتشار 2008