TY - GEN
T1 - Detect, Pack and Batch
T2 - 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, EUROCRYPT 2023
AU - Abraham, Ittai
AU - Asharov, Gilad
AU - Patil, Shravani
AU - Patra, Arpita
N1 - Publisher Copyright: © 2023, International Association for Cryptologic Research.
PY - 2023
Y1 - 2023
N2 - We prove that perfectly-secure optimally-resilient secure Multi-Party Computation (MPC) for a circuit with C gates and depth D can be obtained in O((Cn+ n4+ Dn2) log n) communication complexity and O(D) expected time. For D≪ n and C≥ n3, this is the first perfectly-secure optimal-resilient MPC protocol with linear communication complexity per gate and constant expected time complexity per layer. Compared to state-of-the-art MPC protocols in the player elimination framework [Beerliova and Hirt TCC’08, and Goyal, Liu, and Song CRYPTO’19], for C> n3 and D≪ n, our results significantly improve the run time from Θ(n+ D) to expected O(D) while keeping communication complexity at O(Cnlog n). Compared to state-of-the-art MPC protocols that obtain an expected O(D) time complexity [Abraham, Asharov, and Yanai TCC’21], for C> n3, our results significantly improve the communication complexity from O(Cn4log n) to O(Cnlog n) while keeping the expected run time at O(D). One salient part of our technical contribution is centered around a new primitive we call detectable secret sharing. It is perfectly-hiding, weakly-binding, and has the property that either reconstruction succeeds, or O(n) parties are (privately) detected. On the one hand, we show that detectable secret sharing is sufficiently powerful to generate multiplication triplets needed for MPC. On the other hand, we show how to share p secrets via detectable secret sharing with communication complexity of just O(n4log n+ plog n). When sharing p≥ n4 secrets, the communication cost is amortized to just O(1 ) per secret. Our second technical contribution is a new Verifiable Secret Sharing protocol that can share p secrets at just O(n4log n+ pnlog n) word complexity. When sharing p≥ n3 secrets, the communication cost is amortized to just O(n) per secret. The best prior required O(n3) communication per secret.
AB - We prove that perfectly-secure optimally-resilient secure Multi-Party Computation (MPC) for a circuit with C gates and depth D can be obtained in O((Cn+ n4+ Dn2) log n) communication complexity and O(D) expected time. For D≪ n and C≥ n3, this is the first perfectly-secure optimal-resilient MPC protocol with linear communication complexity per gate and constant expected time complexity per layer. Compared to state-of-the-art MPC protocols in the player elimination framework [Beerliova and Hirt TCC’08, and Goyal, Liu, and Song CRYPTO’19], for C> n3 and D≪ n, our results significantly improve the run time from Θ(n+ D) to expected O(D) while keeping communication complexity at O(Cnlog n). Compared to state-of-the-art MPC protocols that obtain an expected O(D) time complexity [Abraham, Asharov, and Yanai TCC’21], for C> n3, our results significantly improve the communication complexity from O(Cn4log n) to O(Cnlog n) while keeping the expected run time at O(D). One salient part of our technical contribution is centered around a new primitive we call detectable secret sharing. It is perfectly-hiding, weakly-binding, and has the property that either reconstruction succeeds, or O(n) parties are (privately) detected. On the one hand, we show that detectable secret sharing is sufficiently powerful to generate multiplication triplets needed for MPC. On the other hand, we show how to share p secrets via detectable secret sharing with communication complexity of just O(n4log n+ plog n). When sharing p≥ n4 secrets, the communication cost is amortized to just O(1 ) per secret. Our second technical contribution is a new Verifiable Secret Sharing protocol that can share p secrets at just O(n4log n+ pnlog n) word complexity. When sharing p≥ n3 secrets, the communication cost is amortized to just O(n) per secret. The best prior required O(n3) communication per secret.
UR - http://www.scopus.com/inward/record.url?scp=85161712251&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-30617-4_9
DO - 10.1007/978-3-031-30617-4_9
M3 - منشور من مؤتمر
SN - 9783031306167
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 251
EP - 281
BT - Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings
A2 - Hazay, Carmit
A2 - Stam, Martijn
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 23 April 2023 through 27 April 2023
ER -