Abstract
In this work we develop a new theory for concretely efficient, large-scale MPC with active security. Current practical techniques are mostly in the strong setting of all-but-one corruptions, which leads to protocols that scale badly with the number of parties. To work around this issue, we consider a large-scale scenario where a small minority out of many parties is honest and design scalable, more efficient MPC protocols for this setting. Our results are achieved by introducing new techniques for information-theoretic MACs with short keys and extending the work of Hazay et al. (CRYPTO 2018), which developed new passively secure MPC protocols in the same context. We further demonstrate the usefulness of this theory in practice by analyzing the concrete communication overhead of our protocols, which improve upon the most efficient previous works.
| Original language | English |
|---|---|
| Title of host publication | Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings |
| Editors | Thomas Peyrin, Steven Galbraith |
| Publisher | Springer Verlag |
| Pages | 86-117 |
| Number of pages | 32 |
| ISBN (Print) | 9783030033316 |
| DOIs | |
| State | Published - 2018 |
| Event | 24th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2018 - Brisbane, Australia Duration: 2 Dec 2018 → 6 Dec 2018 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 11274 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 24th Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2018 |
|---|---|
| Country/Territory | Australia |
| City | Brisbane |
| Period | 2/12/18 → 6/12/18 |
Bibliographical note
Publisher Copyright:© 2018, International Association for Cryptologic Research.
Funding
C. Hazay—Supported by the European Research Council under the ERC consolidators grant agreement n. 615172 (HIPS), and by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. E. Orsini—Supported in part by ERC Advanced Grant ERC-2015-AdG-IMPaCT. P. Scholl—Supported by the European Union’s Horizon 2020 research and innovation programme under grant agreement No 731583 (SODA), and the Danish Independent Research Council under Grant-ID DFF-6108-00169 (FoCC). E. Soria-Vazquez—Supported by the European Union’s Horizon 2020 research and innovation programme under the Marie Sk lodowska-Curie grant agreement No. 643161, and by ERC Advanced Grant ERC-2015-AdG-IMPaCT.
| Funders | Funder number |
|---|---|
| FoCC | |
| Marie Sk lodowska-Curie | |
| Natur og Univers, Det Frie Forskningsråd | DFF-6108-00169 |
| Horizon 2020 Framework Programme | 690978, 731583, 643161 |
| European Commission | 615172, ERC-2015-AdG-IMPaCT |
| Horizon 2020 |