Efficient Perfectly Secure Computation with Optimal Resilience
Autor: | Gilad Asharov, Ittai Abraham, Avishay Yanai |
---|---|
Rok vydání: | 2021 |
Předmět: | |
Zdroj: | Theory of Cryptography ISBN: 9783030904524 TCC (2) |
Popis: | Secure computation enables n mutually distrustful parties to compute a function over their private inputs jointly. In 1988 Ben-Or, Goldwasser, and Wigderson (BGW) demonstrated that any function can be computed with perfect security in the presence of a malicious adversary corrupting at most \(t< n/3\) parties. After more than 30 years, protocols with perfect malicious security, with round complexity proportional to the circuit’s depth, still require sharing a total of \(O(n^2)\) values per multiplication. In contrast, only O(n) values need to be shared per multiplication to achieve semi-honest security. Indeed sharing \(\varOmega (n)\) values for a single multiplication seems to be the natural barrier for polynomial secret sharing-based multiplication. |
Databáze: | OpenAIRE |
Externí odkaz: |