Efficient Three-party Computation: An Information-theoretic Approach from Cut-and-Choose

08/10/2019
by   Zhili Chen, et al.
0

As far as we know, the literature on secure computation from cut-and-choose has focused on achieving computational security against malicious adversaries. It is unclear whether the idea of cut-and-choose can be adapted to secure computation with information-theoretic security. In this work we explore the possibility of using cut-and-choose in information theoretic setting for secure three-party computation (3PC). Previous work on 3PC has mainly focus on the semi-honest case, and is motivated by the observation that real-word deployments of multi-party computation (MPC) seem to involve few parties. We propose a new protocol for information-theoretically secure 3PC tolerating one malicious party with cheating probability 2^-s using s runs of circuit computation in the cut-and-choose paradigm. The computational cost of our protocol is essentially only a small constant worse than that of state-of-the-art 3PC protocols against a semi-honest corruption, while its communication round is greatly reduced compared to other maliciously secure 3PC protocols in information-theoretic setting.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/15/2019

Quantum preprocessing for information-theoretic security in two-party computation

In classical two-party computation, a trusted initializer who prepares c...
research
07/29/2020

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries

Due to the great development of secure multi-party computation, many pra...
research
09/27/2020

Information Theoretic HotStuff

This work presents Information Theoretic HotStuff (IT-HS), a new optimal...
research
12/27/2022

Information-theoretically secure equality-testing protocol with dispute resolution

There are often situations where two remote users each have data, and wi...
research
05/31/2019

Human-Usable Password Schemas: Beyond Information-Theoretic Security

Password users frequently employ passwords that are too simple, or they ...
research
05/19/2023

Must the Communication Graph of MPC Protocols be an Expander?

Secure multiparty computation (MPC) on incomplete communication networks...
research
01/28/2021

Security, Fault Tolerance, and Communication Complexity in Distributed Systems

We present efficient and practical algorithms for a large, distributed s...

Please sign up or login with your details

Forgot password? Click here to reset