Advertisement

Perfect Secure Computation in Two Rounds

  • Benny ApplebaumEmail author
  • Zvika Brakerski
  • Rotem Tsabary
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11239)

Abstract

We show that any multi-party functionality can be evaluated using a two-round protocol with perfect correctness and perfect semi-honest security, provided that the majority of parties are honest. This settles the round complexity of information-theoretic semi-honest MPC, resolving a longstanding open question (cf. Ishai and Kushilevitz, FOCS 2000). The protocol is efficient for \({\mathrm {NC}}^1\) functionalities. Furthermore, given black-box access to a one-way function, the protocol can be made efficient for any polynomial functionality, at the cost of only guaranteeing computational security.

Technically, we extend and relax the notion of randomized encoding to specifically address multi-party functionalities. The property of a multi-party randomized encoding (MPRE) is that if the functionality g is an encoding of the functionality f, then for any (permitted) coalition of players, their respective outputs and inputs in g allow them to simulate their respective inputs and outputs in f, without learning anything else, including the other outputs of f.

Notes

Acknowledgements

We are grateful to Yuval Ishai, Akshayaram Srinivasan, Muthuramakrishnan Venkitasubramaniam, and Hoteck Wee for valuable discussions and to the anonymous referees of TCC 2018 for carefully reading this paper and for providing us with helpful feedback.

References

  1. 1.
    Ananth, P., Choudhuri, A.R., Goel, A., Jain, A.: Round-optimal secure multiparty computation with honest majority. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10992, pp. 395–424. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-96881-0_14CrossRefGoogle Scholar
  2. 2.
    Applebaum, B.: Garbled circuits as randomized encodings of functions: a primer. Tutorials on the Foundations of Cryptography. ISC, pp. 1–44. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-57048-8_1CrossRefGoogle Scholar
  3. 3.
    Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC\({}^{\text{0}}\). In: Proceedings of 45th Symposium on Foundations of Computer Science (FOCS 2004), 17–19 October 2004, Rome, Italy, pp. 166–175. IEEE Computer Society (2004)Google Scholar
  4. 4.
    Applebaum, B., Ishai, Y., Kushilevitz, E.: Computationally private randomizing polynomials and their applications. Comput. Complex. 15(2), 115–162 (2006)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Bar-Ilan, J., Beaver, D.: Non-cryptographic fault-tolerant computing in constant number of rounds of interaction. In: Rudnicki, P. (ed.) Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, Edmonton, Alberta, Canada, 14–16 August 1989, pp. 201–209. ACM (1989)Google Scholar
  6. 6.
    Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: Ortiz, H. (ed.) Proceedings of the 22nd Annual ACM Symposium on Theory of Computing, 13–17 May 1990, Baltimore, Maryland, USA, pp. 503–513. ACM (1990)Google Scholar
  7. 7.
    Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: Simon [25], pp. 1–10 (1988)Google Scholar
  8. 8.
    Benhamouda, F., Lin, H.: \(k\)-round multiparty computation from \(k\)-round oblivious transfer via garbled interactive circuits. In: Nielsen and Rijmen [23], pp. 500–532 (2018).  https://doi.org/10.1007/978-3-319-78375-8_17CrossRefGoogle Scholar
  9. 9.
    Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143–202 (2000)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, 14–17 October 2001, Las Vegas, Nevada, USA, pp. 136–145. IEEE Computer Society (2001)Google Scholar
  11. 11.
    Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: Simon [25], pp. 11–19 (1988)Google Scholar
  12. 12.
    Damgård, I., Ishai, Y.: Constant-round multiparty computation using a black-box pseudorandom generator. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 378–394. Springer, Heidelberg (2005).  https://doi.org/10.1007/11535218_23CrossRefGoogle Scholar
  13. 13.
    Feige, U., Kilian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: Leighton, F.T., Goodrich, M.T. (eds.) Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 23–25 May 1994, Montréal, Québec, Canada, pp. 554–563. ACM (1994)Google Scholar
  14. 14.
    Garg, S., Ishai, Y., Srinivasan, A.: Two-round MPC: information-theoretic and black-box. (2018, to appear in TCC)Google Scholar
  15. 15.
    Garg, S., Srinivasan, A.: Garbled protocols and two-round MPC from bilinear maps. In: Umans, C., (ed.) 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, 15–17 October 2017 Berkeley, CA, USA, pp. 588–599. IEEE Computer Society (2017)Google Scholar
  16. 16.
    Garg, S., Srinivasan, A.: Two-round multiparty secure computation from minimal assumptions. In: Nielsen and Rijmen [23], pp. 468–499 (2018).  https://doi.org/10.1007/978-3-319-78375-8_16CrossRefGoogle Scholar
  17. 17.
    Goldreich, O.: The Foundations of Cryptography - Volume 2, Basic Applications. Cambridge University Press, Cambridge (2004)zbMATHGoogle Scholar
  18. 18.
    Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364–1396 (1999)MathSciNetCrossRefGoogle Scholar
  19. 19.
    Healy, A., Viola, E.: Constant-depth circuits for arithmetic in finite fields of characteristic two. In: Durand, B., Thomas, W. (eds.) STACS 2006. LNCS, vol. 3884, pp. 672–683. Springer, Heidelberg (2006).  https://doi.org/10.1007/11672142_55CrossRefGoogle Scholar
  20. 20.
    Ishai, Y.: Randomization techniques for secure computation. In: Prabhakaran, M., Sahai, A. (eds.) Secure Multi-Party Computation. Cryptology and Information Security Series, vol. 10, pp. 222–248. IOS Press, Amsterdam (2013)Google Scholar
  21. 21.
    Ishai, Y., Kushilevitz, E.: Randomizing polynomials: a new representation with applications to round-efficient secure computation. In: 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12–14 November 2000, Redondo Beach, California, USA, pp. 294–304. IEEE Computer Society (2000)Google Scholar
  22. 22.
    Ishai, Y., Kushilevitz, E.: Perfect constant-round secure computation via perfect randomizing polynomials. In: Widmayer, P., Eidenbenz, S., Triguero, F., Morales, R., Conejo, R., Hennessy, M. (eds.) ICALP 2002. LNCS, vol. 2380, pp. 244–256. Springer, Heidelberg (2002).  https://doi.org/10.1007/3-540-45465-9_22CrossRefGoogle Scholar
  23. 23.
    Nielsen, J.B., Rijmen, V. (eds.) Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, Part II, 29 April–3 May 2018, Tel Aviv, Israel. LNCS, vol. 10821. Springer, Heidelberg (2018).  https://doi.org/10.1007/978-3-319-78375-8zbMATHGoogle Scholar
  24. 24.
    Rogaway, P.: The round-complexity of secure protocols. Ph.D. thesis, MIT (1991)Google Scholar
  25. 25.
    Simon, J. (ed.) Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 2–4 May 1988, Chicago, Illinois, USA. ACM (1988)Google Scholar
  26. 26.
    Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162–167 (1986)Google Scholar

Copyright information

© International Association for Cryptologic Research 2018

Authors and Affiliations

  • Benny Applebaum
    • 1
    Email author
  • Zvika Brakerski
    • 2
  • Rotem Tsabary
    • 2
  1. 1.Tel-Aviv UniversityTel AvivIsrael
  2. 2.Weizmann Institute of ScienceRehovotIsrael

Personalised recommendations