Show simple item record

dc.contributor.authorBoyle, Elette Chantae
dc.contributor.authorGoldwasser, Shafrira
dc.contributor.authorTessaro, Stefano
dc.date.accessioned2019-07-09T14:11:14Z
dc.date.available2019-07-09T14:11:14Z
dc.date.issued2013
dc.identifier.isbn9783642365935
dc.identifier.isbn9783642365942
dc.identifier.issn0302-9743
dc.identifier.issn1611-3349
dc.identifier.urihttps://hdl.handle.net/1721.1/121532
dc.description.abstractWe devise multi-party computation protocols for general secure function evaluation with the property that each party is only required to communicate with a small number of dynamically chosen parties. More explicitly, starting with n parties connected via a complete and synchronous network, our protocol requires each party to send messages to (and process messages from) at most polylog(n) other parties using polylog(n) rounds. It achieves secure computation of any polynomial-time computable randomized function f under cryptographic assumptions, and tolerates up to statically scheduled Byzantine faults. We then focus on the particularly interesting setting in which the function to be computed is a sublinear algorithm: An evaluation of f depends on the inputs of at most q = o(n) of the parties, where the identity of these parties can be chosen randomly and possibly adaptively. Typically, q = polylog(n). While the sublinear query complexity of f makes it possible in principle to dramatically reduce the communication complexity of our general protocol, the challenge is to achieve this while maintaining security: in particular, while keeping the identities of the selected inputs completely hidden. We solve this challenge, and we provide a protocol for securely computing such sublinear f that runs in polylog(n) + O(q) rounds, has each party communicating with at most q •polylog(n) other parties, and supports message sizes polylog(n) •(ℓ + n), where ℓ is the parties' input size. Our optimized protocols rely on a multi-signature scheme, fully homomorphic encryption (FHE), and simulation-sound adaptive NIZK arguments. However, we remark that multi-signatures and FHE are used to obtain our bounds on message size and round complexity. Assuming only standard digital signatures and public-key encryption, one can still obtain the property that each party only communicates with polylog(n) other parties. We emphasize that the scheduling of faults can depend on the initial PKI setup of digital signatures and the NIZK parameters. © 2013 International Association for Cryptologic Research. Keywords: Homomorphic Encryption, Honest Party, Swap Gate, Secure Multiparty Computation, Secure Function Evaluationen_US
dc.language.isoen
dc.publisherSpringer Berlin Heidelbergen_US
dc.relation.isversionof10.1007/978-3-642-36594-2_21en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceother univ websiteen_US
dc.titleCommunication Locality in Secure Multi-party Computationen_US
dc.typeBooken_US
dc.identifier.citationBoyle, Elette, et al. “Communication Locality in Secure Multi-Party Computation.” Theory of Cryptography, edited by Amit Sahai, vol. 7785, Springer Berlin Heidelberg (2013): 356–76.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Mathematicsen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.relation.journalTheory of Cryptographyen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2019-05-29T14:59:44Z
dspace.date.submission2019-05-29T14:59:45Z


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record