Two Round Multiparty Computation via Multi-key FHE

被引:235
作者
Mukherjee, Pratyay [1 ]
Wichs, Daniel [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Northeastern Univ, Boston, MA 02115 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II | 2016年 / 9666卷
关键词
RANDOMIZING POLYNOMIALS;
D O I
10.1007/978-3-662-49896-5_26
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We construct a general multiparty computation (MPC) protocol with only two rounds of interaction in the common random string model, which is known to be optimal. In the honest-but-curious setting we only rely on the learning with errors (LWE) assumption, and in the fully malicious setting we additionally assume the existence of non-interactive zero knowledge arguments (NIZKs). Previously, Asharov et al. (EUROCRYPT '12) showed how to achieve three rounds based on LWE and NIZKs, while Garg et al. (TCC '14) showed how to achieve the optimal two rounds based on indistinguishability obfuscation, but it was unknown if two rounds were possible under standard assumptions without obfuscation. Our approach relies on multi-key fully homomorphic encryption (MFHE), introduced by Lopez-Alt et al. (STOC '12), which enables homomorphic computation over data encrypted under different keys. We present a construction of MFHE based on LWE that significantly simplifies a recent scheme of Clear and McGoldrick (CRYPTO '15). We then extend this construction to allow for a one-round distributed decryption of a multi-key ciphertext. Our entire MPC protocol consists of the following two rounds: 1. Each party individually encrypts its input under its own key and broadcasts the ciphertext. All parties can then homomorphically compute a multi-key encryption of the output. 2. Each party broadcasts a partial decryption of the output using its secret key. The partial decryptions can be combined to recover the output in plaintext.
引用
收藏
页码:735 / 763
页数:29
相关论文
共 35 条
[1]  
Alperin-Sheriff J, 2014, LECT NOTES COMPUT SC, V8616, P297, DOI 10.1007/978-3-662-44371-2_17
[2]  
[Anonymous], 2011, 2011613 CRYPT EPRINT
[3]  
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[4]  
[Anonymous], EXACT ROUND CO UNPUB
[5]  
[Anonymous], 2011, CRYPTOLOGY EPRINT AR
[6]  
[Anonymous], 2012, ITCS 2012
[7]  
[Anonymous], 2015345 CRYPT EPRINT
[8]  
[Anonymous], J CRYPTOLOGY
[9]   Computationally private randomizing polynomials and their applications [J].
Applebaum, B ;
Ishai, Y ;
Kushilevitz, E .
TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2005, :260-274
[10]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29