2020
DOI: 10.1007/978-3-030-64378-2_23
|View full text |Cite
|
Sign up to set email alerts
|

A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity

Abstract: We present a new secure multiparty computation protocol in the preprocessing model that allows for the evaluation of a number of instances of a boolean circuit in parallel, with a small online communication complexity per instance of 10 bits per party and multiplication gate. Our protocol is secure against an active dishonest majority, and can also be transformed, via existing techniques, into a protocol for the evaluation of a single "well-formed" boolean circuit with the same complexity per multiplication ga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…For the case of binary field (i.e., F = F 2 ), we mainly consider two types of MPC protocols in the malicious setting: TinyOT-style [104, 106-110, 164, 165] and MiniMAC-style [164,[166][167][168][169]. In particular, the sub-protocols for generating authenticated triples underlying in the TinyOT-style protocols can be used to design constant-round MPC protocols with malicious security [106][107][108][109][110].…”
Section: Maliciously Secure Protocolsmentioning
confidence: 99%
See 2 more Smart Citations
“…For the case of binary field (i.e., F = F 2 ), we mainly consider two types of MPC protocols in the malicious setting: TinyOT-style [104, 106-110, 164, 165] and MiniMAC-style [164,[166][167][168][169]. In particular, the sub-protocols for generating authenticated triples underlying in the TinyOT-style protocols can be used to design constant-round MPC protocols with malicious security [106][107][108][109][110].…”
Section: Maliciously Secure Protocolsmentioning
confidence: 99%
“…In MiniMAC, an IT-MAC on message x ∈ F k is defined as C(x) * ∆ where ∆ ∈ F k , C is a linear error-correcting code with a large minimum distance and * is the componentwise product. MiniMAC-style MPC protocols [164,[166][167][168][169] also work for layered Boolean circuits where the gates of a Boolean circuit are partitioned into ordered layers and a layer only consists of gates of the same type. The recent MiniMAC-style protocol [166] adopts an algebraic tool called reverse multiplication friendly embedding (RMFE) [170] that is originally proposed for honest-majority MPC, and obtains a lower communication cost.…”
Section: Maliciously Secure Protocolsmentioning
confidence: 99%
See 1 more Smart Citation