Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees

01/28/2022
by   ananya-appan, et al.
0

Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. The optimal resilience for perfectly-secure MPC in synchronous and asynchronous networks is t < n/3 and t < n/4 respectively, where n is the number of parties and t is the number of corruptions. A natural question is whether there exists a protocol tolerating t_s < n/3 corruptions in a synchronous network and t_a < n/4 corruptions in an asynchronous network. We design such a protocol, if 3t_s + t_a < n. For our protocol, we present a perfectly-secure Byzantine agreement (BA) protocol, tolerating t < n/3 corruptions in any network and a perfectly-secure verifiable secret-sharing (VSS) protocol, tolerating t_s and t_a corruptions in a synchronous and an asynchronous network respectively.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/12/2022

Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries

In this work, we study perfectly-secure multi-party computation (MPC) ag...
research
12/21/2021

A Survey on Perfectly-Secure Verifiable Secret-Sharing

Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure dis...
research
02/16/2019

Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead

In this work we present hbAVSS, the Honey Badger of Asynchronous Verifia...
research
06/05/2019

Security in Asynchronous Interactive Systems

Secure function computation has been thoroughly studied and optimized in...
research
11/20/2019

Fast Actively Secure OT Extension for Short Secrets

Oblivious Transfer (OT) is one of the most fundamental cryptographic pri...
research
12/24/2021

Efficient decision tree training with new data structure for secure multi-party computation

We propose a secure multi-party computation (MPC) protocol that construc...
research
07/01/2021

Secure Quantized Training for Deep Learning

We have implemented training of neural networks in secure multi-party co...

Please sign up or login with your details

Forgot password? Click here to reset