Secure Multi-party Computation Minimizing Online Rounds

ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009(2009)

引用 16|浏览0
暂无评分
摘要
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can allow low latency (that is, small round) secure multi-party protocols that are universally-composable (UC). In particular, we allow any polynomial time preprocessing as long as it is independent of the exact circuit and actual inputs of the specific instance problem to solve, with only a bound k on the number of gates in the circuits known. To address the question, we first define the model of "Multi-Party Computation on Encrypted Data" (mp-ced ), implicitly described in [FH96],[JJ00],[CDN01],[DN03]. In this model, computing parties establish a threshold public key in a preprocessing stage, and only then private data, encrypted under the shared public key, is revealed. The computing parties then get the computational circuit they agree upon and evaluate the circuit on the encrypted data. The $\textsc{mp-ced}$ model is interesting since it is well suited for modern computing environments, where many repeated computations on overlapping data are performed. We present two different round-efficient protocols in this model: The first protocol generates k garbled gates in the preprocessing stage and requires only two (online) rounds. The second protocol generates a garbled universal circuit of size O (k logk ) in the preprocessing stage, and requires only one (online) round (i.e., an obvious lower bound), and therefore it can run asynchronously. Both protocols are secure against an active, static adversary controlling any number of parties. When the fraction of parties the adversary can corrupt is less than half, the adversary cannot force the protocols to abort. The $\textsc{mp-ced}$ model is closely related to the general Multi-Party Computation (mpc ) model and, in fact, both can be reduced to each other. The first (resp. second) protocol above naturally gives protocols for three-round (resp. two-round) universally composable $\textsc{mpc}$ secure against active, static adversary controlling any number of parties (with preprocessing).
更多
查看译文
关键词
static adversary,computational circuit,multi-party secure computation,computing party,garbled universal circuit,online rounds,bound k,secure multi-party protocol,exact circuit,encrypted data,secure multi-party computation minimizing,preprocessing stage,secure computation,secure multi party computation,public key,polynomial time,low latency,lower bound,cryptographic protocol,public key cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要