Perfect secure computation in two rounds

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We show that any multi-party functionality can be evaluated using a two-round protocol with perfect correctness and perfect semi-honest security, provided that the majority of parties are honest. This settles the round complexity of information-theoretic semi-honest MPC, resolving a longstanding open question (cf. Ishai and Kushilevitz, FOCS 2000). The protocol is efficient for NC1 functionalities. Furthermore, given black-box access to a one-way function, the protocol can be made efficient for any polynomial functionality, at the cost of only guaranteeing computational security. Technically, we extend and relax the notion of randomized encoding to specifically address multi-party functionalities. The property of a multi-party randomized encoding (MPRE) is that if the functionality g is an encoding of the functionality f, then for any (permitted) coalition of players, their respective outputs and inputs in g allow them to simulate their respective inputs and outputs in f, without learning anything else, including the other outputs of f.

Original languageEnglish
Title of host publicationTheory of Cryptography - 16th International Conference, TCC 2018, Proceedings
Subtitle of host publication16th International Conference, TCC 2018, Proceedings
EditorsAmos Beimel, Stefan Dziembowski
Pages152-174
Number of pages23
DOIs
StatePublished - 4 Nov 2018
Event16th Theory of Cryptography Conference, TCC 2018 - Panaji, India
Duration: 11 Nov 201814 Nov 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11239 LNCS

Conference

Conference16th Theory of Cryptography Conference, TCC 2018
Country/TerritoryIndia
CityPanaji
Period11/11/1814/11/18

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Perfect secure computation in two rounds'. Together they form a unique fingerprint.

Cite this