ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

An Efficient Framework for Unconditionally Secure Multiparty Computation

Choudhury, Ashish and Patra, Arpita (2017) An Efficient Framework for Unconditionally Secure Multiparty Computation. In: IEEE Transactions on Information Theory, 63 (1). pp. 428-468. ISSN 0018-9448

[img] PDF
IEEE_tra_inf_the_63-1_428-468_2017.pdf - Published Version
Restricted to Registered users only

Download (5MB) | Request a copy
Official URL: https://doi.org/10.1109/TIT.2016.2614685

Abstract

Threshold unconditionally secure multiparty computation (MPC) allows a set of n mutually distrusting parties to securely compute an agreed function f over some finite field in the presence of a computationally unbounded adversary, who can maliciously corrupt any t out of the n parties. Most of the known efficient MPC protocols are designed in the offline-online framework introduced in a seminal work by Beaver in CRYPTO 1991. In this framework, the parties generate shared random and private multiplication-triples during the offline phase, which are used later in the online phase for securely evaluating the multiplication gates in the circuit representing f. The efficiency of the MPC protocols in this framework then relies on efficient ways of implementing the offline phase. In this paper, we propose a new and simple framework for generating shared and private random multiplication triples with unconditional security. The existing protocols approach this problem by first producing shared pairs of private and random values, followed by securely computing the shared product of each pair of values. The latter task involves a multiplication protocol for shared values that are typically communication intensive. Our framework takes a completely different approach and shuns the use of multiplication protocol. Namely, we ask the parties to verifiably share random multiplication triples and then securely extract shared random multiplication triples unknown to the adversary, from the shared triples. Realizing our framework in the asynchronous and hybrid network setting,1 we present the first ever MPC protocols with a linear (in the number of parties) communication overhead per multiplication gate in the circuit representing f. These are significant improvements over the best known existing MPC protocols in the asynchronous and hybrid network setting with communication complexity O(n2) and O(n3) , respectively. Our framework when applied to the synchronous setting results in round-efficient MPC protocols.1In a hybrid network, it is assumed that the network is synchronous up to a certain 'point' and asynchronous after that point onward. We assume a hybrid network with just one synchronous round in the beginning.

Item Type: Journal Article
Publication: IEEE Transactions on Information Theory
Publisher: Institute of Electrical and Electronics Engineers Inc.
Additional Information: The copyright for this article belongs to the Institute of Electrical and Electronics Engineers Inc.
Keywords: Cryptographic protocols; information-theoretic security; multiparty computation
Department/Centre: Division of Electrical Sciences > Computer Science & Automation
Date Deposited: 13 Jun 2022 12:06
Last Modified: 13 Jun 2022 12:06
URI: https://eprints.iisc.ac.in/id/eprint/73412

Actions (login required)

View Item View Item