2020
DOI: 10.1007/978-3-030-45724-2_28
|View full text |Cite
|
Sign up to set email alerts
|

Broadcast-Optimal Two-Round MPC

Abstract: An intensive effort by the cryptographic community to minimize the round complexity of secure multi-party computation (MPC) has recently led to optimal two-round protocols from minimal assumptions. Most of the proposed solutions, however, make use of a broadcast channel in every round, and it is unclear if the broadcast channel can be replaced by standard point-to-point communication in a round-preserving manner, and if so, at what cost on the resulting security. In this work, we provide a complete … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 65 publications
0
5
0
Order By: Relevance
“…The paper by Damgård et al [48] described an interesting approach to work on two-round broadcast MPC with minimal setup. It would be interesting to observe how we can modify the designed V-zkHawk broadcast two-round MPC method with said method [48] as well as other two-round broadcast optimal methods [49,50]. We can further improve the security of our protocol by extending it to work for adaptive adversaries [51].…”
Section: Discussionmentioning
confidence: 99%
“…The paper by Damgård et al [48] described an interesting approach to work on two-round broadcast MPC with minimal setup. It would be interesting to observe how we can modify the designed V-zkHawk broadcast two-round MPC method with said method [48] as well as other two-round broadcast optimal methods [49,50]. We can further improve the security of our protocol by extending it to work for adaptive adversaries [51].…”
Section: Discussionmentioning
confidence: 99%
“…To prevent the adversary from gaining an advantage, using its rewinds, we adopt a strategy to hide the third round message of Π and only reveal it in the fourth round. To do that we follow an approach similar to [1,14,18], by embedding the next-message function of Π inside a garbled circuit (GC). More precisely, each party (e.g., P 1 ) upon receiving the second round message of Π creates a GC that contains all the messages of Π generated so far, its input and randomness.…”
Section: Technical Overviewmentioning
confidence: 99%
“…. , C , 26 is due, P 0 sends separate messages, one for each committee, each containing a uniformly distributed bit.…”
Section: The Modelmentioning
confidence: 99%
“…2 Throughout the paper, unless explicitly stated otherwise, by security with abort we mean unanimous abort where all honest parties reach agreement on whether to abort or not. We note that since we consider a broadcast model, the weaker notion of non-unanimous abort [34,26] in which some honest parties may abort while other receive their output, can be uplifted to unanimous abort in a single broadcast round.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation