Round-Optimal and Communication-Efficient Multiparty Computation

被引:2
作者
Ciampi, Michele [1 ]
Ostrovsky, Rafail [2 ]
Waldner, Hendrik [1 ]
Zikas, Vassilis [3 ]
机构
[1] Univ Edinburgh, Edinburgh, Midlothian, Scotland
[2] Univ Calif Los Angeles, Los Angeles, CA USA
[3] Purdue Univ, W Lafayette, IN 47907 USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I | 2022年 / 13275卷
基金
美国国家科学基金会; 欧盟地平线“2020”;
关键词
PROTOCOLS;
D O I
10.1007/978-3-031-06944-4_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Typical approaches for minimizing the round complexity of multiparty computation (MPC) come at the cost of increased communication complexity (CC) or the reliance on setup assumptions. A notable exception is the recent work of Ananth et al. [TCC 2019], which used Functional Encryption (FE) combiners to obtain a round optimal (tworound) semi-honest MPC in the plain model with a CC proportional to the depth and input-output length of the circuit being computed-we refer to such protocols as circuit scalable. This leaves open the question of obtaining communication efficient protocols that are secure against malicious adversaries in the plain model, which we present in this work. Concretely, our two main contributions are: 1) We provide a round-preserving black-box compiler that compiles a wide class of MPC protocols into circuit-scalable maliciously secure MPC protocols in the plain model, assuming (succinct) FE combiners. 2) We provide a round-preserving black-box compiler that compiles a wide class of MPC protocols into circuit-independent-i.e., with a CC that depends only on the input-output length of the circuit-maliciously secure MPC protocols in the plain model, assuming Multi-Key FullyHomomorphic Encryption (MFHE). Our constructions are based on a new compiler that turns a wide class of MPC protocols into k-delayedinput function MPC protocols (a notion we introduce), where the function that is being computed is specified only in the k-th round of the protocol. As immediate corollaries of our two compilers, we derive (1) the first round-optimal and circuit-scalable maliciously secure MPC, and (2) the first round-optimal and circuit-independent maliciously secure MPC in the plain model. The latter MPC achieves the best to-date CC for a round-optimal malicious MPC protocol. In fact, it is even communication-optimal when the output size of the function being evaluated is smaller than its input size (e.g., for boolean functions). All of our results are based on standard polynomial time assumptions.
引用
收藏
页码:65 / 95
页数:31
相关论文
共 41 条
  • [1] Ananth P, 2020, 2020180 CRYPT EPRINT
  • [2] From FE Combiners to Secure MPC and Back
    Ananth, Prabhanjan
    Badrinarayanan, Saikrishna
    Jain, Aayush
    Manohar, Nathan
    Sahai, Amit
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2019, PT I, 2019, 11891 : 199 - 228
  • [3] [Anonymous], 2004, 36 ANN ACM S THEOR C, DOI [10.1145/1007352.1007393, DOI 10.1145/1007352.1007393]
  • [4] [Anonymous], 1981, ADV CRYPT IEEE WORKS
  • [5] [Anonymous], 2010, CRYPTOLOGY EPRINT AR
  • [6] Asharov Gilad., 2011, Report 2011/613, P613
  • [7] Promise Zero Knowledge and Its Applications to Round Optimal MPC
    Badrinarayanan, Saikrishna
    Goyal, Vipul
    Jain, Abhishek
    Kalai, Yael Tauman
    Khurana, Dakshita
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 459 - 487
  • [8] BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
  • [9] k-Round Multiparty Computation from k-Round Oblivious Transfer via Garbled Interactive Circuits
    Benhamouda, Fabrice
    Lin, Huijia
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 500 - 532
  • [10] Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16