Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time.

EUROCRYPT (2)(2023)

引用 2|浏览14
暂无评分
摘要
We prove that perfectly-secure optimally-resilient secure Multi-Party Computation (MPC) for a circuit with C gates and depth D can be obtained in O ( ( C n + n 4 + D n 2 ) log n ) communication complexity and O ( D ) expected time. For D ≪ n and C ≥ n 3 , this is the first perfectly-secure optimal-resilient MPC protocol with linear communication complexity per gate and constant expected time complexity per layer. Compared to state-of-the-art MPC protocols in the player elimination framework [Beerliova and Hirt TCC’08, and Goyal, Liu, and Song CRYPTO’19], for C > n 3 and D ≪ n , our results significantly improve the run time from Θ ( n + D ) to expected O ( D ) while keeping communication complexity at O ( C n log n ) . Compared to state-of-the-art MPC protocols that obtain an expected O ( D ) time complexity [Abraham, Asharov, and Yanai TCC’21], for C > n 3 , our results significantly improve the communication complexity from O ( C n 4 log n ) to O ( C n log n ) while keeping the expected run time at O ( D ) . One salient part of our technical contribution is centered around a new primitive we call detectable secret sharing . It is perfectly-hiding, weakly-binding, and has the property that either reconstruction succeeds, or O ( n ) parties are (privately) detected. On the one hand, we show that detectable secret sharing is sufficiently powerful to generate multiplication triplets needed for MPC. On the other hand, we show how to share p secrets via detectable secret sharing with communication complexity of just O ( n 4 log n + p log n ) . When sharing p ≥ n 4 secrets, the communication cost is amortized to just O ( 1 ) per secret. Our second technical contribution is a new Verifiable Secret Sharing protocol that can share p secrets at just O ( n 4 log n + p n log n ) word complexity. When sharing p ≥ n 3 secrets, the communication cost is amortized to just O ( n ) per secret. The best prior required O ( n 3 ) communication per secret.
更多
查看译文
关键词
linear communication,perfectly-secure
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要