Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption

被引:0
作者
Luo, Yun [1 ]
Chen, Yuling [1 ]
Li, Tao [1 ]
Tan, Chaoyue [2 ]
Dou, Hui [1 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Peoples R China
[2] Guizhou Univ, State Key Lab Publ Big Data, Guiyang, Peoples R China
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2024年 / 13卷 / 01期
基金
中国国家自然科学基金;
关键词
Secure multiparty computation; Cloud computing; UC framework; LWE assumption; Round complexity; PROTOCOLS; MPC;
D O I
10.1186/s13677-023-00586-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has data leakage from all parties, security protection of private data, and existing solutions do not provide a trade-off between security and overhead. With distributed data communication due to data barriers, information interaction security and data computation security have become challenges for secure computing. Combining cloud computing with secure multiparty computation can provide a higher level of data protection while maintaining the benefits of cloud computing. In this case, data can be stored in the cloud and computed through SMPC protocols, thus protecting the privacy and security of the data. However, multiple rounds of information interaction are often required, increasing the communication overhead, and the security strength is limited by the hardness assumption. In this paper, we work to achieve an optimal setting of the number of rounds in secure multi-party computation on the cloud to achieve a sublinear communication overhead and improve the security concept. A 2-round SMPC protocol is constructed in the framework of Universally Composable (UC). A 2-round SMPC protocol is constructed that uses multilinear maps based on the Learning from Errors (LWE) assumption. The participant encodes the input and sends it via broadcast to reduce the interaction, homomorphic computational encoding information for secure access to computational data and secure the SMPC protocol through UC security. This paper extends the participants to multiple parties, reduces the communication rounds to 2, the protocol achieves sublinear communication overhead in poly polynomial time, smaller setup size to poly(k), and static security is achieved.
引用
收藏
页数:13
相关论文
共 5 条
  • [1] Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption
    Yun Luo
    Yuling Chen
    Tao Li
    Chaoyue Tan
    Hui Dou
    Journal of Cloud Computing, 13
  • [2] Two-round Multiparty Secure Computation from Minimal Assumptions
    Garg, Sanjam
    Srinivasan, Akshayaram
    JOURNAL OF THE ACM, 2022, 69 (05)
  • [3] Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions
    Benhamouda, Fabrice
    Lin, Huijia
    Polychroniadou, Antigoni
    Venkitasubramaniam, Muthuramakrishnan
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 175 - 205
  • [4] Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
    Patra, Arpita
    Srinivasan, Akshayaram
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT II, 2021, 12826 : 185 - 213
  • [5] Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing
    Falamas, Diana-Elena
    Marton, Kinga
    Suciu, Alin
    SYMMETRY-BASEL, 2021, 13 (05):