TinyKeys: A New Approach to Efficient Multi-Party Computation

Carmit Hazay, Emmanuela Orsini, Peter Scholl, Eduardo Soria-Vazquez

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact that within the dishonest majority setting the efficiency of most practical protocols does not depend on the number of honest parties, we investigate how to construct protocols which improve in efficiency as the number of honest parties increases. Our central idea is to take a protocol which is secure for n- 1 corruptions and modify it to use short symmetric keys, with the aim of basing security on the concatenation of all honest parties’ keys. This results in a more efficient protocol tolerating fewer corruptions, whilst also introducing an LPN-style syndrome decoding assumption. We first apply this technique to a modified version of the semi-honest GMW protocol, using OT extension with short keys, to improve the efficiency of standard GMW with fewer corruptions. We also obtain more efficient constant-round MPC, using BMR-style garbled circuits with short keys, and present an implementation of the online phase of this protocol. Our techniques start to improve upon existing protocols when there are around n= 10 parties with h= 4 honest parties, and as these increase we obtain up to a 13 times reduction (for n= 400 , h= 120) in communication complexity for our GMW variant, compared with the best-known GMW-based protocol modified to use the same threshold.

Original languageEnglish
Article number13
JournalJournal of Cryptology
Volume35
Issue number2
DOIs
StatePublished - Apr 2022

Bibliographical note

Publisher Copyright:
© 2022, International Association for Cryptologic Research.

Keywords

  • Large-Scale
  • Multi-Party Computation
  • Syndrome Decoding

Fingerprint

Dive into the research topics of 'TinyKeys: A New Approach to Efficient Multi-Party Computation'. Together they form a unique fingerprint.

Cite this