Asynchronous Multiparty Computation: Theory and Implementation

被引:0
作者
Damgard, Ivan [1 ]
Geisler, Martin [1 ]
Kroigaard, Mikkel [1 ]
Nielsen, Jesper Buus [1 ]
机构
[1] Univ Aarhus, Dept Comp Sci, DK-8000 Aarhus C, Denmark
来源
PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS | 2009年 / 5443卷
关键词
SHARE;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose an asynchronous protocol for general multiparty computation. The protocol has perfect security and communication complexity O(n(2)vertical bar C vertical bar k), where n is the number of parties, vertical bar C vertical bar is the size of the arithmetic circuit being computed, and k is the size of elements in the underlying field. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which no information is released. The communication complexity of this protocol is the same as that of a passively secure solution up to a constant factor. It is secure against an adaptive and active adversary corrupting less than n/3 players. We also present a software framework for implementation of asynchronous protocols called VIFF (Virtual Ideal Functionality Framework), which allows automatic parallelization of primitive operations such as secure multiplications, without having to resort to complicated multithreading. Benchmarking of a VIFF implementation of our protocol confirms that it is applicable to practical non-trivial secure computations.
引用
收藏
页码:160 / 179
页数:20
相关论文
共 13 条
[1]  
[Anonymous], 1988, P 20 ANN ACM S THEOR
[2]  
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[3]  
BEERLIOVATRUBIN.Z, 2008, ALMOST ASYNCHR UNPUB
[4]  
BENOR M, 2001, STOC, P1
[5]  
Bogetoft P., 2008, 2008068 CRYPT EPRINT
[6]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[7]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[8]  
Cramer R, 2005, LECT NOTES COMPUT SC, V3378, P342
[9]  
Goldreich O., 1987, P 19 ANN ACM S THEOR, P218, DOI DOI 10.1145/28395.28420
[10]  
HIRT M, 2001, LNCS, V2139, P101