Abstract
Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MPC protocol allows a set of n mutually distrusting parties to carry out any joint computation of their private inputs, without disclosing any additional information about their inputs. MPC with information-theoretic security (also called unconditional security) provides the strongest security guarantees and remains secure even against computationally unbounded adversaries. Perfectly-secure MPC protocols are a class of information-theoretically secure MPC protocols, which provide all the security guarantees in an error-free fashion. The focus of this work is perfectly-secure MPC. Known protocols are designed assuming either a synchronous or asynchronous communication network. It is well known that perfectly-secure synchronous MPC is possible as long as the adversary can corrupt any ts < n/3 parties. On the other hand, perfectly-secure asynchronous MPC protocols can tolerate up to ta < n/4 corrupt parties. A natural question is does there exist a single MPC protocol for the setting where the parties are not aware of the exact network type and which can tolerate up to ts < n/3 corruptions in a synchronous network and up to ta < n/4 corruptions in an asynchronous network. We design such a best-of-both-worlds perfectly-secure MPC protocol, provided 3ts+ ta < n holds. For designing our protocol, we design two important building blocks which are of independent interest. The first building block is a best-of-both-worlds Byzantine agreement (BA) protocol tolerating t < n/3 corruptions which remains secure both in a synchronous as well as asynchronous network. The second building block is a polynomial-based best-of-both-worlds verifiable secret-sharing (VSS) protocol, which can tolerate up to ts and ta corruptions in a synchronous and in an asynchronous network respectively.
Original language | English |
---|---|
Pages (from-to) | 5386-5425 |
Number of pages | 40 |
Journal | IEEE Transactions on Information Theory |
Volume | 69 |
Issue number | 8 |
DOIs | |
State | Published - 1 Aug 2023 |
Bibliographical note
Publisher Copyright:© 1963-2012 IEEE.
Funding
The work of Ashish Choudhury was supported in part by the Visvesvaraya Ph.D. Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation (formerly Media Lab Asia); and in part by the Center for Internet of Ethical Things (CIET) project, sponsored by the Department of Electronics Information Technology Biotechnology (ITBT), Government of Karnataka. An earlier version of this paper was presented at the 2022 Symposium on Principles of Distributed Computing (PODC 2022)
Funders | Funder number |
---|---|
Center for Internet of Ethical Things | |
Department of Electronics Information Technology Biotechnology | |
Digital India Corporation | |
ITBT | |
Ministry of Electronics and Information technology |
Keywords
- MPC
- Perfect security
- asynchronous network
- byzantine agreement
- synchronous network
- verifiable secret sharing