Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time

Ittai Abraham, Gilad Asharov, Shravani Patil, Arpita Patra

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

We prove that perfectly-secure optimally-resilient secure Multi-Party Computation (MPC) for a circuit with C gates and depth D can be obtained in O((Cn+ n4+ Dn2) log n) communication complexity and O(D) expected time. For D≪ n and C≥ n3, this is the first perfectly-secure optimal-resilient MPC protocol with linear communication complexity per gate and constant expected time complexity per layer. Compared to state-of-the-art MPC protocols in the player elimination framework [Beerliova and Hirt TCC’08, and Goyal, Liu, and Song CRYPTO’19], for C> n3 and D≪ n, our results significantly improve the run time from Θ(n+ D) to expected O(D) while keeping communication complexity at O(Cnlog n). Compared to state-of-the-art MPC protocols that obtain an expected O(D) time complexity [Abraham, Asharov, and Yanai TCC’21], for C> n3, our results significantly improve the communication complexity from O(Cn4log n) to O(Cnlog n) while keeping the expected run time at O(D). One salient part of our technical contribution is centered around a new primitive we call detectable secret sharing. It is perfectly-hiding, weakly-binding, and has the property that either reconstruction succeeds, or O(n) parties are (privately) detected. On the one hand, we show that detectable secret sharing is sufficiently powerful to generate multiplication triplets needed for MPC. On the other hand, we show how to share p secrets via detectable secret sharing with communication complexity of just O(n4log n+ plog n). When sharing p≥ n4 secrets, the communication cost is amortized to just O(1 ) per secret. Our second technical contribution is a new Verifiable Secret Sharing protocol that can share p secrets at just O(n4log n+ pnlog n) word complexity. When sharing p≥ n3 secrets, the communication cost is amortized to just O(n) per secret. The best prior required O(n3) communication per secret.

Original languageEnglish
Title of host publicationAdvances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings
EditorsCarmit Hazay, Martijn Stam
PublisherSpringer Science and Business Media Deutschland GmbH
Pages251-281
Number of pages31
ISBN (Print)9783031306167
DOIs
StatePublished - 2023
Event42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2023 - Lyon, France
Duration: 23 Apr 202327 Apr 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14005 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2023
Country/TerritoryFrance
CityLyon
Period23/04/2327/04/23

Bibliographical note

Publisher Copyright:
© 2023, International Association for Cryptologic Research.

Fingerprint

Dive into the research topics of 'Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time'. Together they form a unique fingerprint.

Cite this