Multiparty Protocol that Usually Shuffles

03/08/2021
by   Dhaneshwar Mardi, et al.
0

Multiparty computation is raising importance because it's primary objective is to replace any trusted third party in the distributed computation. This work presents two multiparty shuffling protocols where each party, possesses a private input, agrees on a random permutation while keeping the permutation secret. The proposed shuffling protocols are based on permutation network, thereby data-oblivious. The first proposal is n-permute that permutes n inputs in all n! possible ways. n-permute network consists of 2logn-1 layers, and in each layer there are n/2 gates. Our second protocol is n_π-permute shuffling that defines a permutation set Π={π_1,…,π_N} where |Π| < n!, and the resultant shuffling is a random permutation π_i ∈Π. The n_π-permute network contains leases number of layers compare to n-permute network. Let n=n_1n_2, the n_π-permute network would define 2logn_1-1+logn_2 layers. The proposed shuffling protocols are unconditionally secure against malicious adversary who can corrupt at most t<n/3 parties. The probability that adversary can learn the outcome of n-permute is upper bound by ((n-t)!)^-1. Whereas, the probability that adversary can learn the outcome of n_π-permute is upper bounded by (f_Π(n_1-θ_1)^n_22^θ_2)^-1, for some positive integer θ_1, θ_2, and a recursive definition of f_Π. The protocols allow the parties to build quorums, and distribute the load among the quorums.

READ FULL TEXT

page 1

page 15

research
05/26/2022

Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries

In this paper, we design secure multi-party computation (MPC) protocols ...
research
10/09/2019

Secret key agreement from correlated data, with no prior information

A fundamental question that has been studied in cryptography and in info...
research
05/04/2020

A Tight Lower Bound on Adaptively Secure Full-Information Coin Flip

In a distributed coin-flipping protocol, Blum [ACM Transactions on Compu...
research
06/02/2023

Network Agnostic MPC with Statistical Security

We initiate the study of the network agnostic MPC protocols with statist...
research
01/22/2023

VeraSel: Verifiable Random Selection for Mixnets Construction

The security and performance of Mixnets depends on the trustworthiness o...
research
09/10/2021

RandSolomon: optimally resilient multi-party random number generation protocol

Multi-party random number generation is a key building-block in many pra...
research
05/03/2021

Three-Party Integer Comparison and Applications

Secure integer comparison has been a popular research topic in cryptogra...

Please sign up or login with your details

Forgot password? Click here to reset