TY - GEN
T1 - MPC with Low Bottleneck-Complexity
T2 - 4th Conference on Information-Theoretic Cryptography, ITC 2023
AU - Keller, Hannah
AU - Orlandi, Claudio
AU - Paskin-Cherniavsky, Anat
AU - Ravi, Divya
N1 - Publisher Copyright:
© Hannah Keller, Claudio Orlandi, Anat Paskin-Cherniavsky, and Divya Ravi; licensed under Creative Commons License CC-BY 4.0 4th Conference on Information-Theoretic Cryptography (ITC 2023)
PY - 2023/7
Y1 - 2023/7
N2 - The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the maximum number of bits which are sent and received by any party in protocol. As the name suggests, the goal of studying BC-efficient protocols is to increase overall efficiency by making sure that the workload in the protocol is somehow “amortized” by the protocol participants. Orlandi et al. [28] initiated the study of BC-efficient protocols from simple assumptions in the correlated randomness model and for semi-honest adversaries. In this work, we extend the study of [28] in two primary directions: (a) to a larger and more general class of functions and (b) to the information-theoretic setting. In particular, we offer semi-honest secure protocols for the useful function classes of abelian programs, “read-k” non-abelian programs, and “read-k” generalized formulas. Our constructions use a novel abstraction, called incremental function secret-sharing (IFSS), that can be instantiated with unconditional security or from one-way functions (with different efficiency trade-offs).
AB - The bottleneck-complexity (BC) of secure multiparty computation (MPC) protocols is a measure of the maximum number of bits which are sent and received by any party in protocol. As the name suggests, the goal of studying BC-efficient protocols is to increase overall efficiency by making sure that the workload in the protocol is somehow “amortized” by the protocol participants. Orlandi et al. [28] initiated the study of BC-efficient protocols from simple assumptions in the correlated randomness model and for semi-honest adversaries. In this work, we extend the study of [28] in two primary directions: (a) to a larger and more general class of functions and (b) to the information-theoretic setting. In particular, we offer semi-honest secure protocols for the useful function classes of abelian programs, “read-k” non-abelian programs, and “read-k” generalized formulas. Our constructions use a novel abstraction, called incremental function secret-sharing (IFSS), that can be instantiated with unconditional security or from one-way functions (with different efficiency trade-offs).
KW - Bottleneck Complexity
KW - Information-theoretic
KW - Secure Multiparty Computation
UR - http://www.scopus.com/inward/record.url?scp=85169064997&partnerID=8YFLogxK
U2 - 10.4230/LIPIcs.ITC.2023.11
DO - 10.4230/LIPIcs.ITC.2023.11
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
AN - SCOPUS:85169064997
T3 - Leibniz International Proceedings in Informatics, LIPIcs
BT - 4th Conference on Information-Theoretic Cryptography, ITC 2023
A2 - Chung, Kai-Min
PB - Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
Y2 - 6 June 2023 through 8 June 2023
ER -