@inproceedings{173ba42cf73c4fec98e3648945497c29,
title = "Four Round Secure Computation Without Setup",
abstract = "We construct a 4-round multi-party computation protocol in the plain model for any functionality, secure against a malicious adversary. Our protocol relies on the sub-exponential hardness of the Learning with Errors (LWE) problem with slightly super-polynomial noise ratio, and on the existence of adaptively secure commitments based on standard assumptions. Our round complexity matches a lower bound of Garg et al. (EUROCRYPT {\textquoteright}16), and outperforms the state of the art of 6 rounds based on similar assumptions to ours, and 5 rounds relying on indistinguishability obfuscation and other strong assumptions. To do this, we construct an LWE based multi-key FHE scheme with a very simple one-round distributed setup procedure (vs. the trusted setup required in previous LWE based constructions). This lets us construct the first 3-round semi-malicious MPC protocol without setup from standard LWE using the approach of Mukherjee and Wichs (EUROCRYPT {\textquoteright}16). Finally, subexponential hardness and adaptive commitments are used to “compile” the protocol into the fully malicious setting.",
author = "Zvika Brakerski and Shai Halevi and Antigoni Polychroniadou",
note = "Publisher Copyright: {\textcopyright} 2017, International Association for Cryptologic Research.; 15th International Conference on Theory of Cryptography, TCC 2017 ; Conference date: 12-11-2017 Through 15-11-2017",
year = "2017",
month = nov,
day = "5",
doi = "10.1007/978-3-319-70500-2_22",
language = "الإنجليزيّة",
isbn = "9783319704999",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "645--677",
editor = "Yael Kalai and Leonid Reyzin",
booktitle = "Theory of Cryptography",
address = "ألمانيا",
}