Secure Computation Meets Distributed Universal Optimality

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We present a new algorithmic approach to distributed secure algorithms that is based on combining two independent lines of research: secure computation and distributed universal optimality. Our end result provides round-efficient distributed algorithms that protect the privacy of the graph vertices against a (possibly large) coalition of semi-honest adversaries.Secure Computation: The notion of perfect privacy dates back to Yao [FOCS '82], and has been extensively addressed by the Cryptographic community over the years. Most of the prior work considers the Multi-Party-Communication (MPC) model, in which the parties are fully connected. Considerably less is known on the (round) complexity of secure algorithms for general graphs, especially under the classical message passing models, such as the CONGEST model. For any biconnected D-diameter graph, a recent line of works [Parter and Yogev, SODA 19, ICALP 19, PODC 19] presented a simulation result that protects against a single semi-honest corruption, by paying an overhead of D · poly(Δ) CONGEST rounds, where Δ is the maximum degree. Due to an inherent structural barrier, the generalization of the current framework to handling f corruptions, provably leads to an overhead of O(Δ D)Θ(f) rounds. This can also be shown to be tight for the class of store-and-forward algorithms11In which nodes can only propagate messages as atomic units, without the ability to mix multiple messages together.Secure Computation & Universal Optimality. We present an improved framework for secure computation which bypasses the current exponential in f barrier. For every graph G=(V, E) with vertex-connectivity Ω(f), our simulation provides a round overhead of poly(Δ) · O(S Q(G)).2 The graph measure S Q(G) (Shortcut Quality) captures the universal optimal complexity of many network optimization tasks in the (non-secure) CONGEST model, as demonstrated in a recent breakthrough result of [Haeupler, Wajc and Zuzic, STOC 2021]. We are hopeful that the extended graph-theoretic machinery provided in this paper will find further applications in secure computation and beyond.2The notation O(·) hides 2O(√log n) factors.

Original languageEnglish
Title of host publicationProceedings - 2023 IEEE 64th Annual Symposium on Foundations of Computer Science, FOCS 2023
PublisherIEEE Computer Society
Pages2336-2368
Number of pages33
ISBN (Electronic)9798350318944
DOIs
StatePublished - Dec 2023
Event64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023 - Santa Cruz, United States
Duration: 6 Nov 20239 Nov 2023

Publication series

NameProceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
ISSN (Print)0272-5428

Conference

Conference64th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2023
Country/TerritoryUnited States
CitySanta Cruz
Period6/11/239/11/23

All Science Journal Classification (ASJC) codes

  • General Computer Science

Fingerprint

Dive into the research topics of 'Secure Computation Meets Distributed Universal Optimality'. Together they form a unique fingerprint.

Cite this