TY - GEN
T1 - Graph design for secure multiparty computation over non-Abelian groups
AU - Sun, Xiaoming
AU - Yao, Andrew Chi Chih
AU - Tartary, Christophe
PY - 2008
Y1 - 2008
N2 - Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the parties were only allowed to perform black-box operations over the finite group G. They showed three results for the n-product function f G (x 1,...,x n ) :∈=∈x 1 •x 2 •...•x n , where the input of party P i is x i ∈ ∈G for i∈ ∈{1,...,n}. First, if then it is impossible to have a t-private protocol computing f G . Second, they demonstrated that one could t-privately compute f G for any in exponential communication cost. Third, they constructed a randomized algorithm with O(n t 2) communication complexity for any . In this paper, we extend these results in two directions. First, we use percolation theory to show that for any fixed ε>∈0, one can design a randomized algorithm for any using O(n 3) communication complexity, thus nearly matching the known upper bound . This is the first time that percolation theory is used for multiparty computation. Second, we exhibit a deterministic construction having polynomial communication cost for any t∈=∈O(n 1∈-∈ε ) (again for any fixed ε>∈0). Our results extend to the more general function where m∈≥∈n and each of the n parties holds one or more input values.
AB - Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the parties were only allowed to perform black-box operations over the finite group G. They showed three results for the n-product function f G (x 1,...,x n ) :∈=∈x 1 •x 2 •...•x n , where the input of party P i is x i ∈ ∈G for i∈ ∈{1,...,n}. First, if then it is impossible to have a t-private protocol computing f G . Second, they demonstrated that one could t-privately compute f G for any in exponential communication cost. Third, they constructed a randomized algorithm with O(n t 2) communication complexity for any . In this paper, we extend these results in two directions. First, we use percolation theory to show that for any fixed ε>∈0, one can design a randomized algorithm for any using O(n 3) communication complexity, thus nearly matching the known upper bound . This is the first time that percolation theory is used for multiparty computation. Second, we exhibit a deterministic construction having polynomial communication cost for any t∈=∈O(n 1∈-∈ε ) (again for any fixed ε>∈0). Our results extend to the more general function where m∈≥∈n and each of the n parties holds one or more input values.
KW - Graph coloring
KW - Multiparty computation
KW - Non-Abelian groups
KW - Passive adversary
KW - Percolation theory
UR - https://www.scopus.com/pages/publications/58349123013
U2 - 10.1007/978-3-540-89255-7_3
DO - 10.1007/978-3-540-89255-7_3
M3 - 会议稿件
AN - SCOPUS:58349123013
SN - 3540892540
SN - 9783540892540
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 37
EP - 53
BT - Advances in Cryptology - ASIACRYPT 2008 - 14th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
T2 - 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008
Y2 - 7 December 2008 through 11 December 2008
ER -