2018
DOI: 10.1007/978-3-319-96878-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Amortized Complexity of Information-Theoretically Secure MPC Revisited

Abstract: A fundamental and widely-applied paradigm due to Franklin and Yung (STOC 1992) on Shamir-secret-sharing based general n-player MPC shows how one may trade the adversary threshold t against amortized communication complexity, by using a so-called packed version of Shamir's scheme. For e.g. the BGW-protocol (with active security), this trade-off means that if t + 2k − 2 < n/3, then k parallel evaluations of the same arithmetic circuit on different inputs can be performed at the overall cost corresponding to a si… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
40
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 47 publications
(40 citation statements)
references
References 24 publications
0
40
0
Order By: Relevance
“…We illustrate this with examples, in particular we describe the quadratic hull of all the optimal algorithms computed in [3] for small algebras.In our presentation we actually work with multiplication reductions. This is a generalization of multiplication algorithms, that allows for instance evaluation-interpolation at points of higher degree and/or with multiplicities, and also includes the recently introduced notion of "reverse multiplication-friendly embedding" from [5]. All our results hold in this more general context.…”
mentioning
confidence: 80%
“…We illustrate this with examples, in particular we describe the quadratic hull of all the optimal algorithms computed in [3] for small algebras.In our presentation we actually work with multiplication reductions. This is a generalization of multiplication algorithms, that allows for instance evaluation-interpolation at points of higher degree and/or with multiplicities, and also includes the recently introduced notion of "reverse multiplication-friendly embedding" from [5]. All our results hold in this more general context.…”
mentioning
confidence: 80%
“…In the setting of perfectly secure MPC with t < n/3, we show that we can efficiently perform robust reconstruction in the presence of errors, we show that the hyperinvertible matrices needed in the protocol can be obtained over R can be obtained by lifting them from the residue field, and we show how to get MPC over Z/p k Z by efficient verification of the inputs, using techniques from [7]. We give the modifications needed to the protocol of [4], to obtain MPC over Z/p k Z with the communication complexity for a circuit C of size |C| of O(n log(n)|C|) elements in Z/p k Z.…”
Section: Our Contributionsmentioning
confidence: 94%
“…We use an idea from [7] to generate these sharings of random elements in Z/p k Z. Since R is a free module over Z/p k Z of rank d, we can write down a basis of R. In fact, a power basis 1, ξ, .…”
Section: Mpc Over Z/p K Zmentioning
confidence: 99%
See 2 more Smart Citations