Abstract
Secure multi-party computation (MPC) allows a set of n parties to jointly compute an arbitrary computation over their private inputs. Two main variants have been considered in the literature according to the underlying communication model. Synchronous MPC protocols proceed in rounds, and rely on the fact that the communication network provides strong delivery guarantees within each round. Asynchronous MPC protocols achieve security guarantees even when the network delay is arbitrary.
While the problem of MPC has largely been studied in both variants with respect to both feasibility and efficiency results, there is still a substantial gap when it comes to communication complexity of adaptively secure protocols. Concretely, while adaptively secure synchronous MPC protocols with linear communication are known for a long time, the best asynchronous protocol communicates \(\mathcal {O}(n^4 \kappa )\) bits per multiplication.
In this paper, we make progress towards closing this gap by providing two protocols. First, we present an adaptively secure asynchronous protocol with optimal resilience \(t<n/3\) and \(\mathcal {O}(n^2 \kappa )\) bits of communication per multiplication, improving over the state of the art protocols in this setting by a quadratic factor in the number of parties. The protocol has cryptographic security and follows the CDN approach [Eurocrypt’01], based on additive threshold homomorphic encryption.
Second, we show an optimization of the above protocol that tolerates up to \(t<(1-\epsilon )n/3\) corruptions and communicates \(\mathcal {O}(n\cdot \mathsf {poly}(\kappa ))\) bits per multiplication under stronger assumptions.
This work was partially carried out while the author was at ETH Zurich.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This model has also been referred to as weakly-adaptive corruption, or simply adaptive corruption model in the literature.
References
Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420–432. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-46766-1_34
Ben-Sasson, E., Fehr, S., Ostrovsky, R.: Near-linear unconditionally-secure multiparty computation with a dishonest minority. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 663–680. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32009-5_39
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th ACM STOC, pp. 1–10. ACM Press, May 1988. https://doi.org/10.1145/62212.62213
Beerliová-Trubíniová, Z., Hirt, M.: Perfectly-secure MPC with linear communication complexity. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 213–230. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-78524-8_13
Lum, E., Katz, J., Liu-Zhang, C.D., Loss, J.: Asynchronous Byzantine agreement with subquadratic communication. Cryptology ePrint Archive, Report 2020/851 (2020). https://eprint.iacr.org/2020/851
Ben-Or, M., Kelmer, B., Rabin, T.: Asynchronous secure computations with optimal resilience (extended abstract). In: Anderson, J., Toueg, S., (eds.) 13th ACM PODC, pp. 183–192. ACM, August 1994. https://doi.org/10.1145/197917.198088
Bracha, G.: An asynchronous [\((\text{n} - 1)/3\)]-resilient consensus protocol. In: Proceedings of the third annual ACM symposium on Principles of distributed computing, PODC 1984, pp. 154–162, New York, NY, USA. Association for Computing Machinery (1984). https://doi.org/10.1145/800222.806743
Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13, 143–202 (2000). https://doi.org/10.1007/s001459910006
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067 (2000). https://eprint.iacr.org/2000/067
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: 20th ACM STOC, pp. 11–19. ACM Press, May 1988. https://doi.org/10.1145/62212.62214
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. Cryptology ePrint Archive, Report 2000/055, October 2000. https://eprint.iacr.org/2000/055
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280–300. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44987-6_18
Coretti, S., Garay, J., Hirt, M., Zikas, V.: Constant-round asynchronous multi-party computation based on one-way functions. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016, Part II. LNCS, vol. 10032, pp. 998–1021. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53890-6_33
Chopard, A., Hirt, M., Liu-Zhang, C.D.: On communication-efficient asynchronous MPC with adaptive security. Cryptology ePrint Archive, Report 2021/1174 (2021). https://ia.cr/2021/1174
Choudhury, A.: Optimally-resilient unconditionally-secure asynchronous multi-party computation revisited. Cryptology ePrint Archive, Report 2020/906 (2020). https://eprint.iacr.org/2020/906
Choudhury, A., Hirt, M., Patra, A.: Unconditionally secure asynchronous multiparty computation with linear communication complexity. Cryptology ePrint Archive, Report 2012/517 (2012). https://eprint.iacr.org/2012/517
Choudhury, A., Hirt, M., Patra, A.: Asynchronous multiparty computation with linear communication complexity. In: Afek, Y. (ed.) DISC 2013. LNCS, vol. 8205, pp. 388–402. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-41527-2_27
Cohen, R.: Asynchronous secure multiparty computation in constant time. In: Cheng, C.-M., Chung, K.-M., Persiano, G., Yang, B.-Y. (eds.) PKC 2016, Part II. LNCS, vol. 9615, pp. 183–207. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-49387-8_8
Choudhury, A., Patra, A.: Optimally resilient asynchronous MPC with linear communication complexity. In: Proceedings of the International Conference on Distributed Computing and Networking (ICDCN), pp. 1–10 (2015)
Canetti, R., Rabin, T.: Fast asynchronous Byzantine agreement with optimal resilience (1998). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.8120
Damgård, I., Ishai, Y.: Scalable secure multiparty computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 501–520. Springer, Heidelberg (2006). https://doi.org/10.1007/11818175_30
Damgård, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247–264. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_15
Damgård, I., Nielsen, J.B.: Scalable and unconditionally secure multiparty computation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 572–590. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-74143-5_32https://iacr.org/archive/crypto2007/46220565/46220565.pdf
Dwork, C., Naor, M., Reingold, O., Stockmeyer, L.: Magic functions: In memoriam: Bernard m. dwork 1923–1998. J. ACM 50(6), 852–921 (2003). https://doi.org/10.1145/950620.950623
Goyal, V., Liu, Y., Song, Y.: Communication-efficient unconditional MPC with guaranteed output delivery. In: Boldyreva, A., Micciancio, D. (eds.) CRYPTO 2019, Part II. LNCS, vol. 11693, pp. 85–114. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26951-7_4
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Aho, A., (ed.) 19th ACM STOC, pp. 218–229. ACM Press, May 1987. https://doi.org/10.1145/28395.28420
Goyal, V., Song, Y., Zhu, C.: Guaranteed output delivery comes free in honest majority MPC. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020, Part II. LNCS, vol. 12171, pp. 618–646. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-56880-1_22
Hirt, M., Nielsen, J.B.: Robust multiparty computation with linear communication complexity. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 463–482. Springer, Heidelberg (2006). https://doi.org/10.1007/11818175_28
Hirt, M., Nielsen, J.B., Przydatek, B.: Cryptographic asynchronous multi-party computation with optimal resilience. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 322–340. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_19
Hirt, M., Nielsen, J.B., Przydatek, B.: Asynchronous multi-party computation with quadratic communication. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 473–485. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70583-3_39
Patra, A.: Error-free multi-valued broadcast and byzantine agreement with optimal communication complexity. In: Fernàndez Anta, A., Lipari, G., Roy, M. (eds.) OPODIS 2011. LNCS, vol. 7109, pp. 34–49. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-25873-2_4
Patra, A., Choudhury, A., Pandu Rangan, C.: Efficient asynchronous multiparty computation with optimal resilience. Cryptology ePrint Archive, Report 2008/425 (2008). https://eprint.iacr.org/2008/425
Patra, A., Choudhary, A., Rangan, C.P.: Efficient statistical asynchronous verifiable secret sharing with optimal resilience. In: Kurosawa, K. (ed.) ICITS 2009. LNCS, vol. 5973, pp. 74–92. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14496-7_7
Patra, A., Choudhury, A., Pandu Rangan, C.: Efficient asynchronous verifiable secret sharing and multiparty computation. J. Cryptol. 28(1), 49–109 (2015). https://doi.org/10.1007/s00145-013-9172-7
Prabhu, B., Srinathan, K., Rangan, C.P.: Asynchronous unconditionally secure computation: an efficiency improvement. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 93–107. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36231-2_9
Rabin, T., Ben-Or,M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: 21st ACM STOC, pp. 73–85. ACM Press, May 1989. https://doi.org/10.1145/73007.73014
Srinathan, K., Pandu Rangan, C.: Efficient asynchronous secure multiparty distributed computation. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 117–129. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-44495-5_11
Yao, A.C.: Theory and applications of trapdoor functions (extended abstract). In: 23rd FOCS, pp. 80–91. IEEE Computer Society Press, November 1982. https://doi.org/10.1109/SFCS.1982.45
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Appendices
A Details of the Subprotocols
1.1 A.1 Decryption protocols
Private Decryption. The private decryption protocol PrivDec takes the public key pk, a ciphertext c and a party P as public input and the secret keys \(sk_1,\ldots ,sk_n\) as private inputs. The protocol has no public nor private output for all parties except for P, who privately outputs the plaintext underlying c. This section is along the lines of [BH08, CHP12, CP15].
Lemma 3
Every party that remains uncorrupted until the end of the execution terminates the PrivDec protocol. Furthermore, if P is honest at the end of the protocol, then its output m is the correct decryption of c even in the presence of an adaptive adversary actively corrupting up to \(t <n/3\) parties. The protocol has communication complexity \(\mathcal {O}(n\kappa )\).
Proof
In this whole proof, an honest party is a party that is never corrupted by the adversary and remains honest during the whole execution of the protocol.
Termination: Clearly all honest parties apart from P terminate as they only need to compute a decryption share and send it to P. Furthermore, if P is honest, then it terminates since all honest parties send correct decryption shares. Hence, P eventually receives at least \(n-t \geqslant t+1\) correct decryption shares from distinct parties, runs Comb and obtains and outputs a message m.
Correctness: As we saw above, P eventually receives at least \(t+1\) correct decryption shares from distinct parties. Hence, thanks to correctness of the threshold homomorphic encryption scheme, we can deduce that P can compute the correct decryption m of c. If P is honest, then it computes and outputs m.
It is easy to see that the communication complexity is indeed \(\mathcal {O}(n\kappa )\) .
The proof works for an adaptive adversary corrupting at most t parties because the reasoning above is independent of which parties the adversary corrupts at what point in time (we only talk about parties that remain honest during the whole execution of the protocol).
Amortized Public Decryption. The public reconstruction protocol PubDec takes the public key pk and \(T = n-2t\) ciphertexts \(c_1,\ldots , c_T\) as public inputs and the secret keys \(sk_1,\ldots ,sk_n\) as private inputs. The protocol publicly outputs the plaintexts \(m_1,\ldots ,m_T\) underlying the ciphertexts \(c_1,\ldots , c_T\). This section is along the lines of [DN07, CHP12, BH08, CP15].
Lemma 4
Every party that remains uncorrupted until the end of the execution terminates the PubDec protocol and outputs the correct decryptions of \(c_1,\ldots ,c_T\) even in the presence of an adaptive adversary actively corrupting up to \(t <n/3\) parties. The protocol has communication complexity \(\mathcal {O}(n^2\kappa )\).
Proof
In this whole proof, an honest party is a party that is never corrupted by the adversary and remains honest during the whole execution of the protocol.
Termination: (taken from [CHP12]) Since all honest parties participate in the PrivDec\((P_i,v_i)\) protocols for all \(i\in \{1,\ldots ,n\}\), termination of the PrivDec protocol implies that all honest parties terminate steps 1–3. Next, define the polynomial \(g'(x) = \sum _{j=1}^{T} x^{j-1} \cdot _{pk} m_j\). Since \(c_j\) is an encryption of \(m_j\) under pk for all \(j\in \{1,\ldots ,T\}\), the homomorphic property of the encryption scheme implies that g(x) is an encryption of \(g'(x)\) under pk for all \(x \in R_{pk}\). In particular, this holds for \(x = \alpha _k\) for all \(k\in \{1,\ldots ,n\}\). Hence, by the correctness of the PrivDec protocol and by definition of \(u_k\), we have \(u_k = g'(\alpha _k)\) for all honest parties \(P_k\). Now, let \(P_i\) be an arbitrary honest party and let \(\widehat{j}\) be the first iteration when all honest parties are in \(\mathcal {P}'_i\) (note that every honest party eventually includes all honest parties in \(\mathcal {P}'_i\) and since there are at most \(n = T+2t\) parties, we have \(\widehat{j} \leqslant t\)). Then, either PolyFind already found a polynomial in iteration j for \(j<\widehat{j}\) and \(P_i\) terminated before iteration \(\widehat{j}\) or in iteration \(\widehat{j}\), \(\mathcal {P}'_i\) is of size \(T+t+\widehat{j}\) and contains \(n-t = T+t\) honest parties. Hence, since \(g'\) is a polynomial of degree at most \(T-1\) and at least \(T+t\) input points (namely the points from honest parties) lie on \(g'\), we can be sure that the PolyFind algorithm finds a polynomial and \(P_i\) terminates in step \(\widehat{j}\). Hence, after at most \(\widehat{j} \leqslant t\) iterations, \(P_i\) terminates. Note that if in an iteration j the PolyFind algorithm fails to find a polynomial that passes the checks, then \(P_i\) has not received all the \(u_k'=u_k\)’s from honest parties as otherwise the PolyFind algorithm would have succeeded (see above). Hence, if in an iteration the PolyFind algorithm fails to compute a suitable polynomial, then it is ok for \(P_i\) to proceed with the next iteration because it is guaranteed that \(P_i\) can eventually add at least one party to \(\mathcal {P}'_i\) and as soon as \(P_i\) has all the \(u_k\)’s from honest parties (i.e. all honest parties are in \(\mathcal {P}'_i\)), it can terminate (and this will happen before the tth iteration ended).
Correctness: Let \(P_i\) be any honest party. As \(P_i\) terminates, it found a polynomial p of degree at most \(T-1\) and a set of parties \(\mathcal {P}''_i\) of size at least \(T+t\) such that \(P_i\) received a message \(u_k'\) from all \(P_k \in \mathcal {P}''_i\) and \(u_k' = p(\alpha _k)\) for all \(P_k \in \mathcal {P}''_i\). Since there are at most t corrupted parties, at least T of the parties in \(\mathcal {P}''_i\) are honest. In the proof for termination, we saw that for honest parties, \(u_k' = u_k = g'(\alpha _k)\). Therefore, there exist T distinct elements \(\alpha _k\) with \(p(\alpha _k) = g'(\alpha _k)\). Since T points uniquely define a polynomial of degree at most \(T-1\) and both p and \(g'\) are polynomials of degree at most \(T-1\), we can conclude that \(p = g'\) and \(P_i\) can correctly compute and output the messages \(m_1,\ldots ,m_T\) underlying the ciphertexts \(c_1,\ldots ,c_T\).
The claim about the communication complexity follows directly from the communication complexity of the PrivDec protocol.
Again, the proof works for an adaptive adversary corrupting at most t parties because the reasoning above is independent of which parties the adversary corrupts at what point in time (we only talk about parties that remain honest during the whole execution of the protocol).
Remark 8
In every instance of the PubDec protocol, each party executes the PolyFind algorithm up to \(t+1\) times. By using local player elimination, we can reduce the number of runs of the PolyFind algorithm in m instances of the PubDec protocol to \(t+m\) per party (instead of \(m(t+1)\)). More precisely, if in iteration j the run of the PolyFind algorithm of an honest party fails to output a polynomial that passes the checks, then at least \(j+1\) of the inputs must be wrong (otherwise the PolyFind algorithm would have succeeded). Since every party outputs a polynomial satisfying all the checks at latest in round t, each party can then detect which inputs were wrong and can locally eliminate the parties that sent those wrong values. In any future run of the PolyFind algorithm in the PubDec protocol, the party ignores the values sent from parties it locally eliminated (respectively, it does not include parties it locally eliminated in \(\mathcal {P}'_i\)).
Remark 9
By reduction and by Remark 2, we can deduce that for \(c_1^1,\ldots ,c_T^1\) and \(c_1^2,\ldots ,c_T^2\) two computationally indistinguishably distributed sets of T ciphertexts with computationally indistinguishably distributed sets of underlying plaintexts, an instance of the PubDec protocol with \((pk,c_1^1,\ldots , c_T^1)\) as public input (and \(sk_1,\ldots , sk_n\) as private inputs) is computationally indistinguishably distributed to an instance of the PubDec protocol with \((pk,c_1^2,\ldots ,c_T^2)\) as public input (and \(sk_1,\ldots , sk_n\) as private inputs) even in the presence of an active adaptive adversary corrupting up to \(t<n/3\) parties.
1.2 A.2 Multiplication
This subsection presents the multiplication protocol which is based on [DN07] and the Multiplication Gate in the Computation Phase protocol of [BH08]. The protocol uses circuit randomization which was originally introduced in [Bea92].
Let \(T = \lfloor \frac{n-2t}{2} \rfloor \). Our multiplication protocol processes up to T independent multiplication gates at the same time. To ensure independence of the gates, every run of the multiplication protocol only considers multiplication gates with a specific multiplicative depth.
The multiplication protocol takes as input T multiplication gates \(m_1,\ldots , m_T\) with the same multiplicative depth, the 2T inputs \(\{(X_i,Y_i)\}_{i \in \{1,\ldots ,T\}}\) (encrypting the values \(\{(x_i,y_i)\}_{i \in \{1,\ldots ,T\}}\)) to the given multiplication gates and the T encrypted multiplication triples \(\{(A_i,B_i,C_i)\}_{i \in \{1,\ldots ,T\}}\) (encrypting the values \(\{(a_i,b_i,a_i\cdot _{pk}b_i)\}_{i \in \{1,\ldots ,T\}}\)) associated with the given multiplication gates \(m_1,\ldots , m_T\). We require that the multiplication triples underlying the encrypted triples \(\{(A_i,B_i,C_i)\}_{i \in \{1,\ldots ,T\}}\) are unknown to the adversary and computationally uniformly and independently distributed over the space of all multiplication triples (the latter is equivalent to the plaintexts underlying the first and second components of the triples being computationally uniformly and independently distributed and the third component being the product of the first two). The protocol publicly outputs T encryptions \(\{Z_i\}_{i \in \{1,\ldots ,T\}}\), where the underlying plaintexts \(z_i\) are equal to \(x_i \cdot _{pk} y_i\) for all \(i \in \{1,\ldots ,T\}\).
Remark 10
-
1.
If \(n-2t\) is odd, then the parties only input \(n-2t-1\) ciphertexts to the PubDec protocol in step 2. In that case, the parties additionally give \({\textsf {Enc}}_{pk}(0_{pk},e)\) as input to the PubDec protocol, where e is again the neutral element of the randomness space, obtain the plaintext \(0_{pk}\) as one of the outputs of PubDec and simply disregard it in all further steps.
-
2.
If only \(T'<T\) multiplication gates are input to the multiplication protocol (for example when there are less than T multiplication gates with the same multiplicative depth in a given circuit), then the parties execute the protocol normally doing all the computations for indices in \(\{1,\ldots , T'\}\) instead of in \(\{1,\ldots , T\}\) and adding the encryption \({\textsf {Enc}}_{pk}(0_{pk},e)\) to the inputs of the PubDec protocol \(n-2t-2T'\) times (where e is again the neutral element of the randomness space).
The multiplication protocol achieves the following.
Proposition 1
Let \(m_1,\ldots , m_T\) be T multiplication gates with the same multiplicative depth and let \(\{(A_i,B_i,C_i)\}_{i \in \{1,\ldots ,T\}}\) be the encrypted multiplication triples associated with the given gates. Furthermore, let \(\{(X_i^1,Y_i^1)\}_{i \in \{1,\ldots ,T\}}\) and \(\{(X_i^2,Y_i^2)\}_{i \in \{1,\ldots ,T\}}\) be two computationally indistinguishably distributed sets of 2T ciphertexts. Then, even in the presence of an active adaptive adversary corrupting up to \(t<n/3\) parties, an execution of the multiplication protocol with \(\{(X_i^1,Y_i^1)\}_{i \in \{1,\ldots ,T\}}\) as inputs to the given gates is computationally indistinguishably distributed from an execution of the multiplication protocol with \(\{(X_i^2,Y_i^2)\}_{i \in \{1,\ldots ,T\}}\) as inputs to the given gates.
Proof
Using reduction it is easy to see that step 1 is computationally indistinguishably distributed in both executions (even if the adversary corrupts a party during step 1).
For step 2, we know by reduction that the ciphertexts \((\{X_i^1 \ominus _{pk} A_i\}_{i \in \{1,\ldots ,T\}},\) \(\{Y_i^1 \ominus _{pk} B_i\}_{i \in \{1,\ldots ,T\}})\) and \((\{X_i^2 \ominus _{pk} A_i\}_{i \in \{1,\ldots ,T\}},\{Y_i^2 \ominus _{pk} B_i\}_{i \in \{1,\ldots ,T\}})\) are computationally indistinguishably distributed. Furthermore, we know that the plaintexts underlying \(\{A_i\}_{i \in \{1,\ldots ,T\}}\) and the plaintexts underlying \(\{B_i\}_{i \in \{1,\ldots ,T\}}\) are unknown to the adversary and computationally uniformly and independently distributed. Therefore, the plaintexts underlying \(\{X_i^1 \ominus _{pk} A_i\}_{i \in \{1,\ldots ,T\}}\), \(\{Y_i^1 \ominus _{pk} B_i\}_{i \in \{1,\ldots ,T\}})\), \(\{X_i^2 \ominus _{pk} A_i\}_{i \in \{1,\ldots ,T\}}\) and \(\{Y_i^2 \ominus _{pk} B_i\}_{i \in \{1,\ldots ,T\}})\) are all unknown to the adversary and computationally uniformly and independently distributed and thus, they are computationally indistinguishably distributed. By Remark 9, we can conclude that step 2 of the multiplication protocol is computationally indistinguishably distributed in both executions, even if the adversary corrupts a party.
As for step 1, a reduction argument shows that steps 3 and 4 maintain computational indistinguishability (even if the adversary corrupts a party during these steps).
Proposition 2
The multiplication protocol communicates \(\mathcal {O}(n^2\kappa )\) bits.
B Protocol
The protocol we present uses a key generation oracle (KG) which sets up all the public and private keys used in our protocol, gives the keys to the entitled parties and provides public Lagrange arguments for all parties. We assume that the simulator has access to an efficient key generation algorithm (KGA) that computes a computationally indistinguishably distributed set of public and private keys and Lagrange arguments. Furthermore, we assume that the parties have access to an encoder and a decoder algorithm that transform values from the message space of the encryption scheme to \(\{0,1\}^*\) and vice versa. We do not explicitly mention when the parties use the encoder and decoder algorithms. They are implicitly used whenever a transformation is necessary.
The description of the protocol follows the structure of the FuncEval\(_f\) Algorithm in [CDN00].
BrACS. In this subsection, we discuss the BrACS protocol used in our MPC protocol. The subprotocol takes as public input the public key pk of the encryption scheme and an encryption M (in our protocol and simulation this is sometimes an encryption of \(1_{pk}\) and other times an encryption of \(0_{pk}\)). The message encrypted by M is denoted by m. For each party \(P_i\) the protocol takes as secret input a message \(a_i\), a randomness \(r_{a_i}\), n values \(c_{ij}\) and 2n commitments \(C_{j\rightarrow i}\) and \(C_{i\rightarrow j}\) for \(j \in \{1 \ldots , n\}\). The \(C_{j\rightarrow i}\)’s represent commitments from \(P_j\) towards \(P_i\). If \(P_i\) and \(P_j\) are both honest, \((a_i,c_{ij})\) is the opening information for the commitment \(C_{i\rightarrow j}\) that \(P_j\) holds. The protocol publicly outputs a set S of parties and for each party \(P_i \in S\) it publicly outputs an encryption of \(a_i\cdot _{pk}m\).
Proposition 3
The BrACS protocol achieves the following properties.
-
a)
The protocol terminates for all honest parties.
-
b)
All parties agree on the set S and the encryptions of parties in S.
-
c)
The set S is of size at least \(n-t\).
-
d)
Every honest party \(P_i\) in S succeeds to reliably broadcast a correct encryption \({\textsf {Enc}}_{pk}^M(a_i)\) of \(a_i\cdot _{pk} m\). This means that the reliable broadcast of \({\textsf {Enc}}_{pk}^M(a_i)\) terminates for all honest parties and that at least one honest party \(P_j\) accepts the proof given by \(P_i\) in step 2, namely that \(P_i\) knows a preimage of \({\textsf {Enc}}_{pk}^M(a_i)\) under (pk, M) and that the first component of this preimage is equal to the value \(P_i\) committed to with \(C_{i\rightarrow j}\). Furthermore, for every corrupted party \(P_i\) in S, the reliable broadcast of y of \(P_i\) in step 1 terminates for all honest parties and at least one honest party \(P_j\) accepts the proof (see above) given by \(P_i\) in step 2. Hence, with high probability, \(P_i\) knows values \((a_i',c_{ij}')\) such that \(y = {\textsf {Enc}}_{pk}^M(a_i')\) and \((a_i',c_{ij}')\) is the opening information to \(C_{i\rightarrow j}\).
The proof is straightforward and therefore omitted.
Rights and permissions
Copyright information
© 2021 International Association for Cryptologic Research
About this paper
Cite this paper
Chopard, A., Hirt, M., Liu-Zhang, CD. (2021). On Communication-Efficient Asynchronous MPC with Adaptive Security. In: Nissim, K., Waters, B. (eds) Theory of Cryptography. TCC 2021. Lecture Notes in Computer Science(), vol 13043. Springer, Cham. https://doi.org/10.1007/978-3-030-90453-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-90453-1_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90452-4
Online ISBN: 978-3-030-90453-1
eBook Packages: Computer ScienceComputer Science (R0)