Choudhury, Ashish and Patra, Arpita (2017) An Efficient Framework for Unconditionally Secure Multiparty Computation. In: IEEE Transactions on Information Theory, 63 (1). pp. 428-468. ISSN 0018-9448
PDF
IEEE_tra_inf_the_63-1_428-468_2017.pdf - Published Version Restricted to Registered users only Download (5MB) | Request a copy |
Abstract
Threshold unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties to securely compute an agreed function f over some finite field in the presence of a computationally unbounded adversary, who can maliciously corrupt any t out of the n parties. Most of the known efficient MPC protocols are designed in the offline-online framework introduced in a seminal work by Beaver in CRYPTO 1991. In this framework, the parties generate shared random and private multiplication-triples during the offline phase, which are used later in the online phase for securely evaluating the multiplication gates in the circuit representing f. The efficiency of the MPC protocols in this framework then relies on efficient ways of implementing the offline phase. In this paper, we propose a new and simple framework for generating shared and private random multiplication triples with unconditional security. The existing protocols approach this problem by first producing shared pairs of private and random values, followed by securely computing the shared product of each pair of values. The latter task involves a multiplication protocol for shared values that are typically communication intensive. Our framework takes a completely different approach and shuns the use of multiplication protocol. Namely, we ask the parties to verifiably share random multiplication triples and then securely extract shared random multiplication triples unknown to the adversary, from the shared triples. Realizing our framework in the asynchronous and hybrid network setting,1 we present the first ever MPC protocols with a linear (in the number of parties) communication overhead per multiplication gate in the circuit representing f. These are significant improvements over the best known existing MPC protocols in the asynchronous and hybrid network setting with communication complexity O(n2) and O(n3) , respectively. Our framework when applied to the synchronous setting results in round-efficient MPC protocols.1In a hybrid network, it is assumed that the network is synchronous up to a certain 'point' and asynchronous after that point onward. We assume a hybrid network with just one synchronous round in the beginning.
Item Type: | Journal Article |
---|---|
Publication: | IEEE Transactions on Information Theory |
Publisher: | Institute of Electrical and Electronics Engineers Inc. |
Additional Information: | The copyright for this article belongs to the Institute of Electrical and Electronics Engineers Inc. |
Keywords: | Cryptographic protocols; information-theoretic security; multiparty computation |
Department/Centre: | Division of Electrical Sciences > Computer Science & Automation |
Date Deposited: | 13 Jun 2022 12:06 |
Last Modified: | 13 Jun 2022 12:06 |
URI: | https://eprints.iisc.ac.in/id/eprint/73412 |
Actions (login required)
View Item |