On the Communication Required for Unconditionally Secure Multiplication

被引:19
作者
Damgard, Ivan [1 ]
Nielsen, Jesper Buus [1 ]
Polychroniadou, Antigoni [1 ]
Raskin, Michael [1 ]
机构
[1] Aarhus Univ, Dept Comp Sci, Aarhus, Denmark
来源
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II | 2016年 / 9815卷
基金
欧洲研究理事会; 美国国家科学基金会; 新加坡国家研究基金会;
关键词
MULTIPARTY COMPUTATION; RANDOMNESS; PRIVACY;
D O I
10.1007/978-3-662-53008-5_16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many information-theoretic secure protocols are known for general secure multi-party computation, in the honest majority setting, and in the dishonest majority setting with preprocessing. All known protocols that are efficient in the circuit size of the evaluated function follow the same "gate-by-gate" design pattern: we work through an arithmetic (boolean) circuit on secret-shared inputs, such that after we process a gate, the output of the gate is represented as a random secret sharing among the players. This approach usually allows non-interactive processing of addition gates but requires communication for every multiplication gate. Thus, while information-theoretic secure protocols are very efficient in terms of computational work, they (seem to) require more communication and more rounds than computationally secure protocols. Whether this is inherent is an open and probably very hard problem. However, in this work we show that it is indeed inherent for protocols that follow the "gate-by-gate" design pattern. We present the following results: - In the honest majority setting, as well as for dishonest majority with preprocessing, any gate-by-gate protocol must communicate O(n) bits for every multiplication gate, where n is the number of players. - In the honest majority setting, we show that one cannot obtain a bound that also grows with the field size. Moreover, for a constant number of players, amortizing over several multiplication gates does not allow us to save on the computational work, and - in a restricted setting - we show that this also holds for communication. All our lower bounds are met up to a constant factor by known protocols that follow the typical gate-by-gate paradigm. Our results imply that a fundamentally new approach must be found in order to improve the communication complexity of known protocols, such as BGW, GMW, SPDZ etc.
引用
收藏
页码:459 / 488
页数:30
相关论文
共 30 条
[1]  
Barkol O, 2005, LECT NOTES COMPUT SC, V3621, P395
[2]  
BEAVER D, 1991, LECT NOTES COMPUT SC, V537, P62
[3]  
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[4]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[5]  
Ben-Sasson E, 2012, LECT NOTES COMPUT SC, V7417, P663
[6]   Randomness complexity of private computation [J].
Blundo, C ;
De Santis, A ;
Persiano, G ;
Vaccaro, U .
COMPUTATIONAL COMPLEXITY, 1999, 8 (02) :145-168
[7]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[8]   A COMMUNICATION-PRIVACY TRADEOFF FOR MODULAR ADDITION [J].
CHOR, B ;
KUSHILEVITZ, E .
INFORMATION PROCESSING LETTERS, 1993, 45 (04) :205-210
[9]  
Cramer R, 2002, LECT NOTES COMPUT SC, V2442, P272
[10]  
Damgard I., 2015, UNCONDITIONALLY SECU