Two Round Information-Theoretic MPC with Malicious Security

被引:15
作者
Ananth, Prabhanjan [1 ]
Choudhuri, Arka Rai [2 ]
Goel, Aarushi [2 ]
Jain, Abhishek [2 ]
机构
[1] MIT, 77 Massachusetts Ave, Cambridge, MA 02139 USA
[2] Johns Hopkins Univ, Baltimore, MD USA
来源
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II | 2019年 / 11477卷
关键词
MULTIPARTY COMPUTATION; PROTOCOLS;
D O I
10.1007/978-3-030-17656-3_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We provide the first constructions of two round information theoretic (IT) secure multiparty computation (MPC) protocols in the plain model that tolerate any t < n/2 malicious corruptions. Our protocols satisfy the strongest achievable standard notions of security in two rounds in different communication models. Previously, IT-MPC protocols in the plain model either required a larger number of rounds, or a smaller minority of corruptions.
引用
收藏
页码:532 / 561
页数:30
相关论文
共 37 条
  • [21] Two-Round Multiparty Secure Computation from Minimal Assumptions
    Garg, Sanjam
    Srinivasan, Akshayaram
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT II, 2018, 10821 : 468 - 499
  • [22] Garbled Protocols and Two-Round MPC from Bilinear Maps
    Garg, Sanjam
    Srinivasan, Akshayaram
    [J]. 2017 IEEE 58TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2017, : 588 - 599
  • [23] Gennaro R, 2002, LECT NOTES COMPUT SC, V2442, P178
  • [24] Gennaro Rosario., 2001, PROC 33 ANN ACM S TH, P580
  • [25] Goldreich O., 1987, P 19 ANN ACM S THEOR, P218, DOI DOI 10.1145/28395.28420
  • [26] Goldreich Oded, 2004, Basic Applications, V2
  • [27] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [28] Halevi S, 2011, LECT NOTES COMPUT SC, V6841, P132, DOI 10.1007/978-3-642-22792-9_8
  • [29] Ishai Y, 2004, LECT NOTES COMPUT SC, V3027, P439
  • [30] Ishai Y, 2002, LECT NOTES COMPUT SC, V2380, P244