Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees

Ananya Appan, Anirudh Chandramouli, Ashish Choudhury

Research output: Contribution to journalArticlepeer-review

Abstract

Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MPC protocol allows a set of n mutually distrusting parties to carry out any joint computation of their private inputs, without disclosing any additional information about their inputs. MPC with information-theoretic security (also called unconditional security) provides the strongest security guarantees and remains secure even against computationally unbounded adversaries. Perfectly-secure MPC protocols are a class of information-theoretically secure MPC protocols, which provide all the security guarantees in an error-free fashion. The focus of this work is perfectly-secure MPC. Known protocols are designed assuming either a synchronous or asynchronous communication network. It is well known that perfectly-secure synchronous MPC is possible as long as the adversary can corrupt any ts < n/3 parties. On the other hand, perfectly-secure asynchronous MPC protocols can tolerate up to ta < n/4 corrupt parties. A natural question is does there exist a single MPC protocol for the setting where the parties are not aware of the exact network type and which can tolerate up to ts < n/3 corruptions in a synchronous network and up to ta < n/4 corruptions in an asynchronous network. We design such a best-of-both-worlds perfectly-secure MPC protocol, provided 3ts+ ta < n holds. For designing our protocol, we design two important building blocks which are of independent interest. The first building block is a best-of-both-worlds Byzantine agreement (BA) protocol tolerating t < n/3 corruptions which remains secure both in a synchronous as well as asynchronous network. The second building block is a polynomial-based best-of-both-worlds verifiable secret-sharing (VSS) protocol, which can tolerate up to ts and ta corruptions in a synchronous and in an asynchronous network respectively.

Original languageEnglish
Pages (from-to)5386-5425
Number of pages40
JournalIEEE Transactions on Information Theory
Volume69
Issue number8
DOIs
StatePublished - 1 Aug 2023

Bibliographical note

Publisher Copyright:
© 1963-2012 IEEE.

Funding

The work of Ashish Choudhury was supported in part by the Visvesvaraya Ph.D. Scheme of Ministry of Electronics & Information Technology, Government of India, being implemented by Digital India Corporation (formerly Media Lab Asia); and in part by the Center for Internet of Ethical Things (CIET) project, sponsored by the Department of Electronics Information Technology Biotechnology (ITBT), Government of Karnataka. An earlier version of this paper was presented at the 2022 Symposium on Principles of Distributed Computing (PODC 2022)

FundersFunder number
Center for Internet of Ethical Things
Department of Electronics Information Technology Biotechnology
Digital India Corporation
ITBT
Ministry of Electronics and Information technology

    Keywords

    • MPC
    • Perfect security
    • asynchronous network
    • byzantine agreement
    • synchronous network
    • verifiable secret sharing

    Fingerprint

    Dive into the research topics of 'Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees'. Together they form a unique fingerprint.

    Cite this