Abstract
We consider the efficiency of protocols for secure multiparty computation (MPC) with a dishonest majority. A popular approach for the design of such protocols is to employ preprocessing. Before the inputs are known, the parties generate correlated secret randomness, which is consumed by a fast and possibly “information-theoretic” online protocol. A powerful technique for securing such protocols against malicious parties uses homomorphic MACs to authenticate the values produced by the online protocol. Compared to a baseline protocol, which is only secure against semi-honest parties, this involves a significant increase in the size of the correlated randomness, by a factor of up to a statistical security parameter. Different approaches for partially mitigating this extra storage cost come at the expense of increasing the online communication. In this work we propose a new technique for protecting MPC with preprocessing against malicious parties. We show that for circuit evaluation protocols that satisfy mild security and structural requirements, that are met by many standard protocols with semi-honest security, the extra additive storage and online communication costs are both logarithmic in the circuit size. This applies to Boolean circuits and to arithmetic circuits over fields or rings, and to both information-theoretic and computationally secure protocols. Our protocol can be viewed as a sublinear information-theoretic variant of the celebrated “GMW compiler” that applies to natural protocols for MPC with preprocessing. Our compiler makes a novel use of the techniques of Boneh et al. (Crypto 2019) for sublinear distributed zero knowledge, which were previously only used in the setting of honest-majority MPC.
Original language | English |
---|---|
Title of host publication | Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings |
Editors | Tal Malkin, Chris Peikert |
Publisher | Springer Science and Business Media Deutschland GmbH |
Pages | 457-485 |
Number of pages | 29 |
ISBN (Print) | 9783030842444 |
DOIs | |
State | Published - 2021 |
Event | 41st Annual International Cryptology Conference, CRYPTO 2021 - Virtual, Online Duration: 16 Aug 2021 → 20 Aug 2021 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 12826 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 41st Annual International Cryptology Conference, CRYPTO 2021 |
---|---|
City | Virtual, Online |
Period | 16/08/21 → 20/08/21 |
Bibliographical note
Publisher Copyright:© 2021, International Association for Cryptologic Research.
Funding
Acknowledgements. E. Boyle supported by ISF grant 1861/16, AFOSR Award FA9550-17-1-0069 FA9550-21-1-0046, and ERC Project HSS (852952). N. Gilboa supported by ISF grant 2951/20, ERC grant 876110, and a grant by the BGU Cyber Center. Y. Ishai supported by ERC Project NTSC (742754), NSF-BSF grant 2015782, BSF grant 2018393, and ISF grant 2774/20. A. Nof supported by ERC Project NTSC (742754).
Funders | Funder number |
---|---|
NSF-BSF | 2015782 |
NTSC | 742754 |
Air Force Office of Scientific Research | FA9550-17-1-0069 FA9550-21-1-0046 |
Hospital for Special Surgery | 852952, 876110, 2951/20 |
European Commission | |
United States-Israel Binational Science Foundation | 2018393, 2774/20 |
Israel Science Foundation | 1861/16 |
Ben-Gurion University of the Negev |