2018
DOI: 10.1007/978-3-319-76578-5_20
|View full text |Cite
|
Sign up to set email alerts
|

Committed MPC

Abstract: We present a new multiparty computation protocol secure against a static and malicious dishonest majority. Unlike most previous protocols that were based on working on MAC-ed secret shares, our approach is based on computations on homomorphic commitments to secret shares. Specifically we show how to realize MPC using any additively-homomorphic commitment scheme, even if such a scheme is an interactive two-party protocol. Our new approach enables us to do arithmetic computation over arbitrary finite fields. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
39
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(40 citation statements)
references
References 38 publications
1
39
0
Order By: Relevance
“…On the other hand, a large relative dimension, or rate, of C will reduce the communication cost, so it is desirable to optimize both parameters. A very similar phenomenon occurs in recent work about commitment schemes, which are a building block of many multiparty computation protocols; in fact, when these schemes have a number of additional homomorphic properties and in addition can be composed securely, we can base the entire secure computation protocol on them [14]. Efficient commitment schemes with such properties were constructed in [5] based on binary linear codes, where multiplicative homomorphic properties require again to have a relatively large d(C * 2 ) (see [5, section 4]) and the rate of the code is also desired to be large to reduce the communication overhead.…”
Section: Introductionsupporting
confidence: 53%
“…On the other hand, a large relative dimension, or rate, of C will reduce the communication cost, so it is desirable to optimize both parameters. A very similar phenomenon occurs in recent work about commitment schemes, which are a building block of many multiparty computation protocols; in fact, when these schemes have a number of additional homomorphic properties and in addition can be composed securely, we can base the entire secure computation protocol on them [14]. Efficient commitment schemes with such properties were constructed in [5] based on binary linear codes, where multiplicative homomorphic properties require again to have a relatively large d(C * 2 ) (see [5, section 4]) and the rate of the code is also desired to be large to reduce the communication overhead.…”
Section: Introductionsupporting
confidence: 53%
“…No. of bits Ours (MB) SHA3-256 (MB) Improvement 2 14 2.51 19.93 8× 2 18 10.90 300.34 28× 2 22 141.25 4805.39 34× 2 26 2169.02 76900* 35× 2 30 34022.77 1230200* 36× A PROOFS FROM SECTION 4…”
Section: Discussionmentioning
confidence: 99%
“…In Table 5, we show the number of indices |I| for the commitment that needs to be computed alongside the size of the entire commitment that a committer needs to prepare in order to commit its input. In these experiments 𝑝 = 3/8 Improvement over LowMCHash-256 2 14 6.14 × 10 5 2.32 × 10 5 5.17 × 10 4 12× 4× 2 18 9.29 × 10 6 3.65 × 10 6 1.90 × 10 5 49× 19× 2 22 1.48 × 10 8 5.84 × 10 7 2.29 × 10 6 65× 25× 2 26 2.37 × 10 9 9.34 × 10 8 3.42 × 10 7 69× 27× 2 30 3.79 × 10 10 1.49 × 10 10 5.39 × 10 8 70× 28× No. of bits Ours (s) SHA3-256 (s) Improvement 2 14 0.07 0.57 8× 2 18 0.22 8.16 36× 2 22 2.67 133.23 50× 2 26 39.14 2200* 56× 2 30 590.70 35500* 60× ).…”
Section: Experimental Performancementioning
confidence: 99%
See 2 more Smart Citations