Secure Multiparty Computation with Minimal Interaction

被引:0
作者
Ishai, Yuval [1 ]
Kushilevitz, Eyal [1 ]
Paskin-Cherniavsky, Anat [1 ]
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2010 | 2010年 / 6223卷
关键词
Secure multiparty computation; round complexity; 2-PARTY COMPUTATION; ROUND COMPLEXITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We revisit the question of secure multiparty computation (MPC) with two rounds of interaction. It was previously shown by Gennaro et al. (Crypto 2002) that 3 or more communication rounds are necessary for general MPC protocols with guaranteed output delivery, assuming that there may be t >= 2 corrupted parties. This negative result holds regardless of the total number of parties, even if broadcast is allowed in each round, and even if only fairness is required. We complement this negative result by presenting matching positive results. Our first main result is that if only one party may be corrupted, then n >= 5 parties can securely compute any function of their inputs using only two rounds of interaction over secure point-to-point channels (without broadcast or any additional setup). The protocol makes a black-box use of a pseudorandom generator, or alternatively can offer unconditional security for functionalities in NC1. We also prove a similar result in a client-server setting, where there are m >= 2 clients who hold inputs and should receive outputs, and n additional servers with no inputs and outputs. For this setting, we obtain a general MPC protocol which requires a single message from each client to each server, followed by a single message from each server to each client. The protocol is secure against a single corrupted client and against coalitions of t < n/3 corrupted servers. The above protocols guarantee output delivery and fairness. Our second main result shows that under a relaxed notion of security, allowing the adversary to selectively decide (after learning its own outputs) which honest parties will receive their (correct) output, there is a general 2-round MPC protocol which tolerates t < n/3 corrupted parties. This protocol relies on the existence of a pseudorandom generator in NC1 (which is implied by standard cryptographic assumptions), or alternatively can offer unconditional security for functionalities in NC1.
引用
收藏
页码:577 / 594
页数:18
相关论文
共 53 条
  • [1] Tight bounds for shared memory systems accessed by Byzantine processes
    Alon, N
    Merritt, M
    Reingold, O
    Taubenfeld, G
    Wright, R
    [J]. DISTRIBUTED COMPUTING, 2005, 18 (02) : 99 - 109
  • [2] [Anonymous], 2004, 36 ACM STOC, DOI [10.1145/1007352.1007393, DOI 10.1145/1007352.1007393]
  • [3] [Anonymous], 1987, 19 ACM STOC, DOI DOI 10.1145/28395.28420
  • [4] Computationally private randomizing polynomials and their applications
    Applebaum, Benny
    Ishai, Yuval
    Kushilevitz, Eyal
    [J]. COMPUTATIONAL COMPLEXITY, 2006, 15 (02) : 115 - 162
  • [5] Bar-Ilan Judit., 1989, Proceedings of the ACM Symposium on Principles of Distributed Computation, P201
  • [6] Barrington D.A., 1986, P 18 STOC, P150
  • [7] BEAVER D, 1991, LECT NOTES COMPUT SC, V537, P62
  • [8] Beaver D, 2000, LECT NOTES COMPUT SC, V1807, P335
  • [9] BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
  • [10] Beimel A., 1996, THESIS DEP COMPUTER