Must the communication graph of MPC protocols be an expander?

Elette Boyle, Ran Cohen, Deepesh Data, Pavel Hubáček

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

16 Scopus citations

Abstract

Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed a priori, and thus corruptions can occur dependent on its structure, and (2) Where edges in the communication graph are determined dynamically as part of the protocol. Whereas a rich literature has succeeded in mapping out the feasibility and limitations of graph structures supporting secure computation in the fixed-graph model (including strong classical lower bounds), these bounds do not apply in the latter dynamic-graph setting, which has recently seen exciting new results, but remains relatively unexplored. In this work, we initiate a similar foundational study of MPC within the dynamic-graph model. As a first step, we investigate the property of graph expansion. All existing protocols (implicitly or explicitly) yield communication graphs which are expanders, but it is not clear whether this is inherent. Our results consist of two types: Upper bounds: We demonstrate secure protocols whose induced communication graphs are not expanders, within a wide range of settings (computational, information theoretic, with low locality, and adaptive security), each assuming some form of input-independent setup.Lower bounds: In the setting without setup and adaptive corruptions, we demonstrate that for certain functionalities, no protocol can maintain a non-expanding communication graph against all adversarial strategies. Our lower bound relies only on protocol correctness (not privacy), and requires a surprisingly delicate argument.

Original languageEnglish
Title of host publicationAdvances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings
EditorsHovav Shacham, Alexandra Boldyreva
PublisherSpringer Verlag
Pages243-272
Number of pages30
ISBN (Print)9783319968773
DOIs
StatePublished - 2018
Externally publishedYes
Event38th Annual International Cryptology Conference, CRYPTO 2018 - Santa Barbara, United States
Duration: 19 Aug 201823 Aug 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10993 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference38th Annual International Cryptology Conference, CRYPTO 2018
Country/TerritoryUnited States
CitySanta Barbara
Period19/08/1823/08/18

Bibliographical note

Publisher Copyright:
© International Association for Cryptologic Research 2018.

Funding

E. Boyle—Supported in part by ISF grant 1861/16, AFOSR Award FA9550-17-1-0069, and ERC Grant no. 307952. R. Cohen—Supported in part by Alfred P. Sloan Foundation Award 996698, ISF grant 1861/16, ERC starting grant 638121, NEU Cybersecurity and Privacy Institute, and NSF TWC-1664445. R. Cohen, D. Data and P. Hubáček—This work was done in part while visiting at the FACT Center at IDC Herzliya. P. Hubáček—Supported by the project 17-09142S of GAČR, Charles University project UNCE/SCI/004, and Charles University project PRIMUS/17/SCI/9. This work was done under financial support of the Neuron Fund for the support of science. In this work, we initiate a similar foundational study of MPC within the dynamic-graph model. As a first step, we investigate the property of graph expansion. All existing protocols (implicitly or explicitly) yield communication graphs which are expanders, but it is not clear whether this is inherent. Our results consist of two types: – Upper bounds: We demonstrate secure protocols whose induced com-munication graphs are not expanders, within a wide range of settings (computational, information theoretic, with low locality, and adap-tive security), each assuming some form of input-independent setup. – Lower bounds: In the setting without setup and adaptive corrup-tions, we demonstrate that for certain functionalities, no proto-col can maintain a non-expanding communication graph against all E. Boyle—Supported in part by ISF grant 1861/16, AFOSR Award FA9550-17-1-0069, and ERC Grant no. 307952. R. Cohen—Supported in part by Alfred P. Sloan Foundation Award 996698, ISF grant 1861/16, ERC starting grant 638121, NEU Cybersecurity and Privacy Institute, and NSF TWC-1664445. R. Cohen, D. Data and P. Hubáˇcek—This work was done in part while visiting at the FACT Center at IDC Herzliya. P. Hubáˇcek—Supported by the project 17-09142S of GA CˇR, Charles University project UNCE/SCI/004, and Charles University project PRIMUS/17/SCI/9. This work was done under financial support of the Neuron Fund for the support of science.

FundersFunder number
National Science FoundationTWC-1664445
Air Force Office of Scientific ResearchFA9550-17-1-0069
Alfred P. Sloan Foundation996698
Univerzita Karlova v PrazePRIMUS/17/SCI/9
Engineering Research Centers
European Commission307952, 638121
Israel Science Foundation1861/16
Northeastern University
Neuron Nadační Fond Na Podporu Vědy

    Fingerprint

    Dive into the research topics of 'Must the communication graph of MPC protocols be an expander?'. Together they form a unique fingerprint.

    Cite this