Must the Communication Graph of MPC Protocols be an Expander?

被引:0
|
作者
Elette Boyle
Ran Cohen
Deepesh Data
Pavel Hubáček
机构
[1] Reichman University and NTT Research,Faculty of Mathematics and Physics
[2] Reichman University,undefined
[3] Meta Platforms,undefined
[4] Inc.,undefined
[5] Charles University,undefined
来源
Journal of Cryptology | 2023年 / 36卷
关键词
Secure multiparty computation; Consensus protocols; Communication graph; Expander graph;
D O I
暂无
中图分类号
学科分类号
摘要
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) where a partial network is fixed a priori, and thus corruptions can occur dependent on its structure, and (2) where edges in the communication graph are determined dynamically as part of the protocol. Whereas a rich literature has succeeded in mapping out the feasibility and limitations of graph structures supporting secure computation in the fixed-graph model (including strong classical lower bounds), these bounds do not apply in the latter dynamic-graph setting, which has recently seen exciting new results, but remains relatively unexplored. In this work, we initiate a similar foundational study of MPC within the dynamic-graph model. As a first step, we investigate the property of graph expansion. All existing protocols (implicitly or explicitly) yield communication graphs which are expanders, but it is not clear whether this is inherent. Our results consist of two types (for constant fraction of corruptions):Upper bounds: We demonstrate secure protocols whose induced communication graphs are not expander graphs, within a wide range of settings (computational, information theoretic, with low locality, even with low locality and adaptive security), each assuming some form of input-independent setup.Lower bounds: In the plain model (no setup) with adaptive corruptions, we demonstrate that for certain functionalities, no protocol can maintain a non-expanding communication graph against all adversarial strategies. Our lower bound relies only on protocol correctness (not privacy) and requires a surprisingly delicate argument. More generally, we provide a formal framework for analyzing the evolving communication graph of MPC protocols, giving a starting point for studying the relation between secure computation and further, more general graph properties.
引用
收藏
相关论文
共 20 条
  • [1] Must the Communication Graph of MPC Protocols be an Expander?
    Boyle, Elette
    Cohen, Ran
    Data, Deepesh
    Hubacek, Pavel
    JOURNAL OF CRYPTOLOGY, 2023, 36 (03)
  • [2] Expander graph arguments for message-passing algorithms
    Burshtein, D
    Miller, G
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (02) : 782 - 790
  • [3] Ramp Hyper-invertible Matrices and Their Applications to MPC Protocols
    Liu, Hongqing
    Xing, Chaoping
    Yang, Yanjiang
    Yuan, Chen
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT I, 2023, 14438 : 204 - 236
  • [4] On Linear Communication Complexity for (Maximally) Fluid MPC
    Bienstock, Alexander
    Escudero, Daniel
    Polychroniadou, Antigoni
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT I, 2023, 14081 : 263 - 294
  • [5] Adaptively Secure MPC with Sublinear Communication Complexity
    Ran Cohen
    Abhi Shelat
    Daniel Wichs
    Journal of Cryptology, 2023, 36
  • [6] Adaptively Secure MPC with Sublinear Communication Complexity
    Cohen, Ran
    Shelat, Abhi
    Wichs, Daniel
    JOURNAL OF CRYPTOLOGY, 2023, 36 (02)
  • [7] Performance Analysis of Expander Graph Based Key Predistribution Scheme in WSN
    Saikia, Monjul
    Hussain, Md. A.
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 724 - 732
  • [8] Optimally Resilient Asynchronous MPC with Linear Communication Complexity
    Choudhury, Ashish
    Patra, Arpita
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2015,
  • [9] Unconditionally secure MPC for Boolean circuits with constant online communication
    Hu, Zhenkai
    Yang, Kang
    Yu, Yu
    2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024, 2024, : 557 - 572
  • [10] Communication-Efficient Unconditional MPC with Guaranteed Output Delivery
    Goyal, Vipul
    Liu, Yanyi
    Song, Yifan
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 85 - 114