Graph design for secure multiparty computation over non-Abelian groups

  • Xiaoming Sun
  • , Andrew Chi Chih Yao
  • , Christophe Tartary

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the parties were only allowed to perform black-box operations over the finite group G. They showed three results for the n-product function f G (x 1,...,x n ) :∈=∈x 1 •x 2 •...•x n , where the input of party P i is x i ∈ ∈G for i∈ ∈{1,...,n}. First, if then it is impossible to have a t-private protocol computing f G . Second, they demonstrated that one could t-privately compute f G for any in exponential communication cost. Third, they constructed a randomized algorithm with O(n t 2) communication complexity for any . In this paper, we extend these results in two directions. First, we use percolation theory to show that for any fixed ε>∈0, one can design a randomized algorithm for any using O(n 3) communication complexity, thus nearly matching the known upper bound . This is the first time that percolation theory is used for multiparty computation. Second, we exhibit a deterministic construction having polynomial communication cost for any t∈=∈O(n 1∈-∈ε ) (again for any fixed ε>∈0). Our results extend to the more general function where m∈≥∈n and each of the n parties holds one or more input values.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2008 - 14th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
Pages37-53
Number of pages17
DOIs
StatePublished - 2008
Event14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008 - Melbourne, VIC, Australia
Duration: 7 Dec 200811 Dec 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5350 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008
Country/TerritoryAustralia
CityMelbourne, VIC
Period7/12/0811/12/08

Keywords

  • Graph coloring
  • Multiparty computation
  • Non-Abelian groups
  • Passive adversary
  • Percolation theory

Fingerprint

Dive into the research topics of 'Graph design for secure multiparty computation over non-Abelian groups'. Together they form a unique fingerprint.

Cite this