Abstract
Secure computation enables n mutually distrustful parties to compute a function over their private inputs jointly. In 1988, Ben-Or, Goldwasser, and Wigderson (BGW) proved that any function can be computed with perfect security in the presence of a malicious adversary corrupting at most t< n/ 3 parties. After more than 30 years, protocols with perfect malicious security, and round complexity proportional to the circuit’s depth, still require (verifiably) sharing a total of O(n2) values per multiplication. In contrast, only O(n) values need to be shared per multiplication to achieve semi-honest security. Sharing Ω (n) values for a single multiplication seems to be the natural barrier for polynomial secret-sharing-based multiplication. In this paper, we construct a new secure computation protocol with perfect, optimal resilience and malicious security that incurs (verifiably) sharing O(n) values per multiplication. Our protocol requires a constant number of rounds per multiplication. Like BGW, it has an overall round complexity that is proportional only to the multiplicative depth of the circuit. Our improvement is obtained by a novel construction for weak VSS for polynomials of degree 2t, which incurs the same communication and round complexities as the state-of-the-art constructions for VSS for polynomials of degree t. Our second contribution is a method for reducing the communication complexity for any depth 1 sub-circuit to be proportional only to the size of the input and output (rather than the size of the circuit). This implies protocols with sub-linear communication complexity (in the size of the circuit) for perfectly secure computation for important functions like matrix multiplication.
Original language | English |
---|---|
Article number | 27 |
Journal | Journal of Cryptology |
Volume | 35 |
Issue number | 4 |
DOIs | |
State | Published - Oct 2022 |
Bibliographical note
Publisher Copyright:© 2022, International Association for Cryptologic Research.
Funding
A preliminary version of this paper appeared in IACR-TCC 2021. Gilad Asharov: Sponsored by the Israel Science Foundation (Grant No. 2439/20), by the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office, and by the European Union’s Horizon 2020 research and innovation program under the Marie Skłodowska-Curie Grant Agreement No. 891234.
Funders | Funder number |
---|---|
Horizon 2020 Framework Programme | |
H2020 Marie Skłodowska-Curie Actions | 891234 |
Israel Science Foundation | 2439/20 |
Keywords
- Foundations
- Perfect security
- Secure computation
- Verifiable secret sharing