Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions

被引:12
作者
Benhamouda, Fabrice [1 ]
Lin, Huijia [2 ]
Polychroniadou, Antigoni [3 ]
Venkitasubramaniam, Muthuramakrishnan [4 ]
机构
[1] IBM Res, Yorktown Hts, NY 10598 USA
[2] Univ Calif Santa Barbara, Santa Barbara, CA 93106 USA
[3] Cornell Tech, New York, NY USA
[4] Univ Rochester, Rochester, NY USA
来源
THEORY OF CRYPTOGRAPHY, TCC 2018, PT I | 2018年 / 11239卷
基金
美国国家科学基金会;
关键词
NON-COMMITTING ENCRYPTION; EFFICIENT; MPC;
D O I
10.1007/978-3-030-03807-6_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present the first two-round multiparty computation (MPC) protocols secure against malicious adaptive corruption in the common reference string (CRS) model, based on DDH, LWE, or QR. Prior two-round adaptively secure protocols were known only in the two-party setting against semi-honest adversaries, or in the general multiparty setting assuming the existence of indistinguishability obfuscation (iO). Our protocols are constructed in two steps. First, we construct two-round oblivious transfer (OT) protocols secure against malicious adaptive corruption in the CRS model based on DDH, LWE, or QR. We achieve this by generically transforming any two-round OT that is only secure against static corruption but has certain oblivious sampleability properties, into a two-round adaptively secure OT. Prior constructions were only secure against semi-honest adversaries or based on iO. Second, building upon recent constructions of two-round MPC from two-round OT in the weaker static corruption setting [Garg and Srinivasan, Benhamouda and Lin, Eurocrypt'18] and using equivocal garbled circuits from [Canetti, Poburinnaya and Venkitasubramaniam, STOC'17], we show how to construct two-round adaptively secure MPC from two-round adaptively secure OT and constant-round adaptively secure MPC, with respect to both malicious and semi-honest adversaries. As a corollary, we also obtain the first 2-round MPC secure against semi-honest adaptive corruption in the plain model based on augmented non-committing encryption (NCE), which can be based on a variety of assumptions, CDH, RSA, DDH, LWE, or factoring Blum integers. Finally, we mention that our OT and MPC protocols in the CRS model are, in fact, adaptively secure in the Universal Composability framework.
引用
收藏
页码:175 / 205
页数:31
相关论文
共 38 条
[1]   Removing Erasures with Explainable Hash Proof Systems [J].
Abdalla, Michel ;
Benhamouda, Fabrice ;
Pointcheval, David .
PUBLIC-KEY CRYPTOGRAPHY (PKC 2017), PT I, 2017, 10174 :151-174
[2]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[3]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[4]   k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits [J].
Benhamouda, Fabrice ;
Lin, Huijia .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 :500-532
[5]   Hash Proof Systems over Lattices Revisited [J].
Benhamouda, Fabrice ;
Blazy, Olivier ;
Ducas, Leo ;
Quach, Willy .
PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT II, 2018, 10770 :644-674
[6]  
Boyle E., 2018, ITCS
[7]   Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation [J].
Boyle, Elette ;
Gilboa, Niv ;
Ishai, Yuval .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 :163-193
[8]   Function Secret Sharing: Improvements and Extensions [J].
Boyle, Elette ;
Gilboa, Niv ;
Ishai, Yuval .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :1292-1303
[9]   Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts [J].
Brakerski, Zvika ;
Perlman, Renen .
ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 :190-213
[10]  
Canetti R., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P19