Better two-round adaptive multi-party computation

Ran Canetti, Oxana Poburinnaya*, Muthuramakrishnan Venkitasubramaniam

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

The only known two-round multi-party computation protocol that withstands adaptive corruption of all parties is the ingenious protocol of Garg and Polychroniadou [TCC 15]. We present protocols that improve on the GP protocol in a number of ways. First, concentrating on the semi-honest case and taking a different approach than GP, we show a two-round, adaptively secure protocol where: - Only a global (i.e., non-programmable) reference string is needed. In contrast, in GP the reference string is programmable, even in the semi-honest case. - Only polynomially-secure indistinguishability obfuscation for circuits and injective one way functions are assumed. In GP, subexponentially secure IO is assumed. Second, we show how to make the GP protocol have only RAM complexity, even for Byzantine corruptions. For this we construct the first statistically-sound non-interactive Zero-Knowledge scheme with RAM complexity.

Original languageEnglish
Title of host publicationPublic-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings
EditorsSerge Fehr
PublisherSpringer Verlag
Pages396-427
Number of pages32
ISBN (Print)9783662543870
DOIs
StatePublished - 2017
Event20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017 - Amsterdam, Netherlands
Duration: 28 Mar 201731 Mar 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10175 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017
Country/TerritoryNetherlands
City Amsterdam
Period28/03/1731/03/17

Fingerprint

Dive into the research topics of 'Better two-round adaptive multi-party computation'. Together they form a unique fingerprint.

Cite this