Abstract
We study secure multiparty computation (MPC) in the dishonest majority setting providing security with identifiable abort, where if the protocol aborts, the honest parties can agree upon the identity of a corrupt party. All known constructions that achieve this notion require expensive zero-knowledge techniques to obtain active security, so are not practical. In this work, we present the first efficient MPC protocol with identifiable abort. Our protocol has an information-theoretic online phase with message complexity O(n2) for each secure multiplication (where n is the number of parties), similar to the BDOZ protocol (Bendlin et al., Eurocrypt 2011), which is a factor in the security parameter lower than the identifiable abort protocol of Ishai et al. (Crypto 2014). A key component of our protocol is a linearly homomorphic information-theoretic signature scheme, for which we provide the first definitions and construction based on a previous non-homomorphic scheme. We then show how to implement the preprocessing for our protocol using somewhat homomorphic encryption, similarly to the SPDZ protocol (Damgård et al., Crypto 2012).
| Original language | English |
|---|---|
| Title of host publication | Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings |
| Editors | Martin Hirt, Adam Smith |
| Publisher | Springer Verlag |
| Pages | 461-490 |
| Number of pages | 30 |
| ISBN (Print) | 9783662536407 |
| DOIs | |
| State | Published - 2016 |
| Externally published | Yes |
| Event | 14th International Conference on Theory of Cryptography, TCC 2016-B - Beijing, China Duration: 31 Oct 2016 → 3 Nov 2016 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 9985 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 14th International Conference on Theory of Cryptography, TCC 2016-B |
|---|---|
| Country/Territory | China |
| City | Beijing |
| Period | 31/10/16 → 3/11/16 |
Bibliographical note
Publisher Copyright:© International Association for Cryptologic Research 2016.
Funding
C. Baum—Part of the work was done while visiting University of Bristol. The author acknowledges support from the Danish National Research Foundation and The National Science Foundation of China (under the grant 61061130540) for the Sino-Danish Center for the Theory of Interactive Computation; and also from the CFEM research center (supported by the Danish Strategic Research Council) and the COST Action IC1306. E. Orsini—Supported in part by ERC Advanced Grant ERC-2010-AdG-267188-CRIPTO. P. Scholl—Supported in part by EPSRC via grant EP/I03126X, and in part by the DARPA Brandeis program and the US Navy under contract #N66001-15-C-4070.
| Funders | Funder number |
|---|---|
| CFEM | |
| Sino-Danish Center for the Theory of Interactive Computation | |
| Strategiske Forskningsråd | |
| European Cooperation in Science and Technology | IC1306 |
| Danmarks Grundforskningsfond | |
| National Natural Science Foundation of China | 61061130540 |
| U.S. Navy | 66001-15-C-4070 |
| Engineering and Physical Sciences Research Council | EP/I03126X |
| Defense Advanced Research Projects Agency |
Keywords
- Identifiable abort
- Secure multiparty computation
Fingerprint
Dive into the research topics of 'Efficient secure multiparty computation with identifiable abort'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver