The Broadcast Message Complexity of Secure Multiparty Computation

被引:1
作者
Garg, Sanjam [1 ]
Goel, Aarushi [2 ]
Jain, Abhishek [2 ]
机构
[1] Univ Calif Berkeley, Berkeley, CA 94720 USA
[2] Johns Hopkins Univ, Baltimore, MD USA
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I | 2019年 / 11921卷
关键词
MPC;
D O I
10.1007/978-3-030-34578-5_16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We study the broadcast message complexity of secure multiparty computation (MPC), namely, the total number of messages that are required for securely computing any functionality in the broadcast model of communication. MPC protocols are traditionally designed in the simultaneous broadcast model, where each round consists of every party broadcasting a message to the other parties. We show that this method of communication is sub-optimal; specifically, by eliminating simultaneity, it is, in fact, possible to reduce the broadcast message complexity of MPC. More specifically, we establish tight lower and upper bounds on the broadcast message complexity of n-party MPC for every t < n corruption threshold, both in the plain model as well as common setup models. For example, our results show that the optimal broadcast message complexity of semi-honest MPC can be much lower than 2n, but necessarily requires at least three rounds of communication. We also extend our results to the malicious setting in setup models.
引用
收藏
页码:426 / 455
页数:30
相关论文
共 26 条
  • [1] Aejaz SMH, 2016, IEEE TOPIC CONF WIRE, P4, DOI 10.1109/WISNET.2016.7444306
  • [2] Round-Optimal Secure Multiparty Computation with Honest Majority
    Ananth, Prabhanjan
    Choudhuri, Arka Rai
    Goel, Aarushi
    Jain, Abhishek
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 395 - 424
  • [3] [Anonymous], 1986, 18 ACM STOC
  • [4] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [5] k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits
    Benhamouda, Fabrice
    Lin, Huijia
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 500 - 532
  • [6] Boyle E., 2018, ITCS 2018, V94
  • [7] Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 163 - 193
  • [8] Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs
    Boyle, Elette
    Chung, Kai-Min
    Pass, Rafael
    [J]. ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 742 - 762
  • [9] Boyle E, 2013, LECT NOTES COMPUT SC, V7785, P356, DOI 10.1007/978-3-642-36594-2_21
  • [10] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214