Round-Optimal Secure Multi-party Computation

Shai Halevi, Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of their private inputs where security should hold in the presence of an active (i.e. malicious) adversary that can corrupt any number of parties. Despite extensive research, the precise round complexity of this “standard-bearer” cryptographic primitive, under polynomial-time hardness assumptions, is unknown. Recently, Garg, Mukherjee, Pandey and Polychroniadou, in Eurocrypt 2016 demonstrated that the round complexity of any MPC protocol relying on black-box proofs of security in the plain model must be at least four. Following this work, independently Ananth, Choudhuri and Jain, CRYPTO 2017 and Brakerski, Halevi, and Polychroniadou, TCC 2017 made progress towards solving this question and constructed four-round protocols based on the DDH and LWE assumptions, respectively, albeit with super-polynomial hardness. More recently, Ciampi, Ostrovsky, Siniscalchi and Visconti in TCC 2017 closed the gap for two-party protocols by constructing a four-round protocol from polynomial-time assumptions, concretely, trapdoor permutations. In another work, Ciampi, Ostrovsky, Siniscalchi and Visconti TCC 2017 showed how to design a four-round multi-party protocol for the specific case of multi-party coin-tossing based on one-way functions. In this work, we resolve this question by designing a four-round actively secure multi-party (two or more parties) protocol for general functionalities under standard polynomial-time hardness assumptions with a black-box proof of security, specifically, under the assumptions LWE, DDH, QR and DCR.

Original languageEnglish
Article number19
JournalJournal of Cryptology
Volume34
Issue number3
DOIs
StatePublished - Jul 2021

Bibliographical note

Publisher Copyright:
© 2021, The Author(s), under exclusive licence to International Association for Cryptologic Research.

Funding

S. Halevi: Research supported by the Defense Advanced Research Projects Agency (DARPA) and Army Research Office(ARO) under Contract No. W911NF-15-C-0236. C. Hazay: Research supported the BIU Center for Research in Applied Cryptography and Cyber Security in conjunction with the Israel National Cyber Bureau in the Prime Minister’s Office. A. Polychroniadou: This work was supported in part by the Artificial Intelligence Research group of JPMorgan Chase & Co and its affiliates (“JP Morgan”), and is not a product of the Research Department of JP Morgan. JP Morgan makes no representation and warranty whatsoever and disclaims all liability, for the completeness, accuracy or reliability of the information contained herein. M. Venkitasubramaniam: Research supported by Google Faculty Research Grant and NSF Award CNS-1526377.

FundersFunder number
Artificial Intelligence Research group of JPMorgan Chase & Co.
National Science FoundationCNS-1526377
Army Research OfficeW911NF-15-C-0236
Defense Advanced Research Projects Agency
Google

    Keywords

    • Additive errors
    • Garbled circuits
    • Round complexity
    • Secure multi-party computation

    Fingerprint

    Dive into the research topics of 'Round-Optimal Secure Multi-party Computation'. Together they form a unique fingerprint.

    Cite this