Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries

Ananya Appan, Anirudh Chandramouli, Ashish Choudhury

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

In this paper, we present a perfectly-secure multi-party computation (MPC) protocol in the asynchronous communication setting with optimal resilience. Our protocol is secure against a computationally-unbounded malicious adversary characterized by an adversary structure Z, which enumerates all possible subsets of potentially corrupt parties. The protocol incurs an amortized communication of O(| Z| 2) bits per multiplication. This improves upon the previous best protocol of Choudhury and Pappu (INDOCRYPT 2020), which requires an amortized communication of O(| Z| 3) bits per multiplication. Previously, perfectly-secure MPC with amortized communication of O(| Z| 2) bits per multiplication was known only in the relatively simpler synchronous communication setting (Hirt and Tschudi, ASIACRYPT 2013).

Original languageEnglish
Title of host publicationProgress in Cryptology – INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, 2022, Proceedings
EditorsTakanori Isobe, Santanu Sarkar
PublisherSpringer Science and Business Media Deutschland GmbH
Pages223-248
Number of pages26
ISBN (Print)9783031229114
DOIs
StatePublished - 2022
Externally publishedYes
Event23rd International Conference on Cryptology, INDOCRYPT 2022 - Kolkata, India
Duration: 11 Dec 202214 Dec 2022

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13774 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd International Conference on Cryptology, INDOCRYPT 2022
Country/TerritoryIndia
CityKolkata
Period11/12/2214/12/22

Bibliographical note

Publisher Copyright:
© 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

Keywords

  • Byzantine agreement
  • Byzantine faults
  • Multi-party computation
  • Non-threshold adversary
  • Privacy
  • Secret-sharing
  • Unconditional-security

Fingerprint

Dive into the research topics of 'Revisiting the Efficiency of Perfectly Secure Asynchronous Multi-party Computation Against General Adversaries'. Together they form a unique fingerprint.

Cite this