On the Communication Complexity of Secure Multi-Party Computation With Aborts

A central goal of cryptography is Secure Multi-party Computation (MPC), where $n$ parties desire to compute a function of their joint inputs without letting any party learn about the inputs of its peers. Unfortunately, it is well-known that MPC guaranteeing output delivery to every party is infeasib...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bartusek, James, Bergamaschi, Thiago, Khoury, Seri, Mutreja, Saachi, Paradise, Orr
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Bartusek, James
Bergamaschi, Thiago
Khoury, Seri
Mutreja, Saachi
Paradise, Orr
description A central goal of cryptography is Secure Multi-party Computation (MPC), where $n$ parties desire to compute a function of their joint inputs without letting any party learn about the inputs of its peers. Unfortunately, it is well-known that MPC guaranteeing output delivery to every party is infeasible when a majority of the parties are malicious. In fact, parties operating over a point-to-point network (i.e. without access to a broadcast channel) cannot even reach an agreement on the output when more than one third of the parties are malicious (Lamport, Shostak, and Pease, JACM 1980). Motivated by this infeasibility in the point-to-point model, Goldwasser and Lindell (J. Cryptol 2005) introduced a definition of MPC that does not require agreement, referred to as MPC with selective abort. Under this definition, any party may abort the protocol if they detect malicious behavior. They showed that MPC with selective abort is feasible for any number of malicious parties by implementing a broadcast functionality with abort. While the model of MPC with abort has attracted much attention over the years, little is known about its communication complexity over point-to-point networks. In this work, we study the communication complexity of MPC with abort and devise nearly-optimal communication efficient protocols in this model. Namely, we prove trade-offs between the number of honest parties $h$, the communication complexity, and the locality of the protocols. Here, locality is a bound on the number of peers with which each party must communicate.
doi_str_mv 10.48550/arxiv.2406.06914
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_2406_06914</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2406_06914</sourcerecordid><originalsourceid>FETCH-LOGICAL-a674-35b473e1d37f4aa4a15ee07f3bde273a6c45725c4cd59ff433123fa3b1eb17c83</originalsourceid><addsrcrecordid>eNotj8tqwzAURLXpoqT9gK6qH7Ar-UpWsgymj0BCAg10aa7kKyLwIyhySf6-dZLVMMNh4DD2IkWu5lqLN4zn8JsXSpS5KBdSPbLNtufpQLwaum7sg8MUhn5qx5bOIV344Pk3uTES34xtCtkO4_86AWO6wT8hHfjSDjGdntiDx_ZEz_ecsf3H-776ytbbz1W1XGdYGpWBtsoAyQaMV4gKpSYSxoNtqDCApVPaFNop1-iF9wpAFuARrCQrjZvDjL3ebq8-9TGGDuOlnrzqqxf8AWdbSOY</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>On the Communication Complexity of Secure Multi-Party Computation With Aborts</title><source>arXiv.org</source><creator>Bartusek, James ; Bergamaschi, Thiago ; Khoury, Seri ; Mutreja, Saachi ; Paradise, Orr</creator><creatorcontrib>Bartusek, James ; Bergamaschi, Thiago ; Khoury, Seri ; Mutreja, Saachi ; Paradise, Orr</creatorcontrib><description>A central goal of cryptography is Secure Multi-party Computation (MPC), where $n$ parties desire to compute a function of their joint inputs without letting any party learn about the inputs of its peers. Unfortunately, it is well-known that MPC guaranteeing output delivery to every party is infeasible when a majority of the parties are malicious. In fact, parties operating over a point-to-point network (i.e. without access to a broadcast channel) cannot even reach an agreement on the output when more than one third of the parties are malicious (Lamport, Shostak, and Pease, JACM 1980). Motivated by this infeasibility in the point-to-point model, Goldwasser and Lindell (J. Cryptol 2005) introduced a definition of MPC that does not require agreement, referred to as MPC with selective abort. Under this definition, any party may abort the protocol if they detect malicious behavior. They showed that MPC with selective abort is feasible for any number of malicious parties by implementing a broadcast functionality with abort. While the model of MPC with abort has attracted much attention over the years, little is known about its communication complexity over point-to-point networks. In this work, we study the communication complexity of MPC with abort and devise nearly-optimal communication efficient protocols in this model. Namely, we prove trade-offs between the number of honest parties $h$, the communication complexity, and the locality of the protocols. Here, locality is a bound on the number of peers with which each party must communicate.</description><identifier>DOI: 10.48550/arxiv.2406.06914</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2024-06</creationdate><rights>http://creativecommons.org/licenses/by/4.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/2406.06914$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.2406.06914$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Bartusek, James</creatorcontrib><creatorcontrib>Bergamaschi, Thiago</creatorcontrib><creatorcontrib>Khoury, Seri</creatorcontrib><creatorcontrib>Mutreja, Saachi</creatorcontrib><creatorcontrib>Paradise, Orr</creatorcontrib><title>On the Communication Complexity of Secure Multi-Party Computation With Aborts</title><description>A central goal of cryptography is Secure Multi-party Computation (MPC), where $n$ parties desire to compute a function of their joint inputs without letting any party learn about the inputs of its peers. Unfortunately, it is well-known that MPC guaranteeing output delivery to every party is infeasible when a majority of the parties are malicious. In fact, parties operating over a point-to-point network (i.e. without access to a broadcast channel) cannot even reach an agreement on the output when more than one third of the parties are malicious (Lamport, Shostak, and Pease, JACM 1980). Motivated by this infeasibility in the point-to-point model, Goldwasser and Lindell (J. Cryptol 2005) introduced a definition of MPC that does not require agreement, referred to as MPC with selective abort. Under this definition, any party may abort the protocol if they detect malicious behavior. They showed that MPC with selective abort is feasible for any number of malicious parties by implementing a broadcast functionality with abort. While the model of MPC with abort has attracted much attention over the years, little is known about its communication complexity over point-to-point networks. In this work, we study the communication complexity of MPC with abort and devise nearly-optimal communication efficient protocols in this model. Namely, we prove trade-offs between the number of honest parties $h$, the communication complexity, and the locality of the protocols. Here, locality is a bound on the number of peers with which each party must communicate.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj8tqwzAURLXpoqT9gK6qH7Ar-UpWsgymj0BCAg10aa7kKyLwIyhySf6-dZLVMMNh4DD2IkWu5lqLN4zn8JsXSpS5KBdSPbLNtufpQLwaum7sg8MUhn5qx5bOIV344Pk3uTES34xtCtkO4_86AWO6wT8hHfjSDjGdntiDx_ZEz_ecsf3H-776ytbbz1W1XGdYGpWBtsoAyQaMV4gKpSYSxoNtqDCApVPaFNop1-iF9wpAFuARrCQrjZvDjL3ebq8-9TGGDuOlnrzqqxf8AWdbSOY</recordid><startdate>20240610</startdate><enddate>20240610</enddate><creator>Bartusek, James</creator><creator>Bergamaschi, Thiago</creator><creator>Khoury, Seri</creator><creator>Mutreja, Saachi</creator><creator>Paradise, Orr</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20240610</creationdate><title>On the Communication Complexity of Secure Multi-Party Computation With Aborts</title><author>Bartusek, James ; Bergamaschi, Thiago ; Khoury, Seri ; Mutreja, Saachi ; Paradise, Orr</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a674-35b473e1d37f4aa4a15ee07f3bde273a6c45725c4cd59ff433123fa3b1eb17c83</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Bartusek, James</creatorcontrib><creatorcontrib>Bergamaschi, Thiago</creatorcontrib><creatorcontrib>Khoury, Seri</creatorcontrib><creatorcontrib>Mutreja, Saachi</creatorcontrib><creatorcontrib>Paradise, Orr</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bartusek, James</au><au>Bergamaschi, Thiago</au><au>Khoury, Seri</au><au>Mutreja, Saachi</au><au>Paradise, Orr</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>On the Communication Complexity of Secure Multi-Party Computation With Aborts</atitle><date>2024-06-10</date><risdate>2024</risdate><abstract>A central goal of cryptography is Secure Multi-party Computation (MPC), where $n$ parties desire to compute a function of their joint inputs without letting any party learn about the inputs of its peers. Unfortunately, it is well-known that MPC guaranteeing output delivery to every party is infeasible when a majority of the parties are malicious. In fact, parties operating over a point-to-point network (i.e. without access to a broadcast channel) cannot even reach an agreement on the output when more than one third of the parties are malicious (Lamport, Shostak, and Pease, JACM 1980). Motivated by this infeasibility in the point-to-point model, Goldwasser and Lindell (J. Cryptol 2005) introduced a definition of MPC that does not require agreement, referred to as MPC with selective abort. Under this definition, any party may abort the protocol if they detect malicious behavior. They showed that MPC with selective abort is feasible for any number of malicious parties by implementing a broadcast functionality with abort. While the model of MPC with abort has attracted much attention over the years, little is known about its communication complexity over point-to-point networks. In this work, we study the communication complexity of MPC with abort and devise nearly-optimal communication efficient protocols in this model. Namely, we prove trade-offs between the number of honest parties $h$, the communication complexity, and the locality of the protocols. Here, locality is a bound on the number of peers with which each party must communicate.</abstract><doi>10.48550/arxiv.2406.06914</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.2406.06914
ispartof
issn
language eng
recordid cdi_arxiv_primary_2406_06914
source arXiv.org
subjects Computer Science - Cryptography and Security
title On the Communication Complexity of Secure Multi-Party Computation With Aborts
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T16%3A01%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=On%20the%20Communication%20Complexity%20of%20Secure%20Multi-Party%20Computation%20With%20Aborts&rft.au=Bartusek,%20James&rft.date=2024-06-10&rft_id=info:doi/10.48550/arxiv.2406.06914&rft_dat=%3Carxiv_GOX%3E2406_06914%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true