Graph Design for Secure Multiparty Computation over Non-Abelian Groups

Recently, Desmedt et al. studied the problem of achieving securen -party computation over non-Abelian groups. Theyconsidered the passive adversary model and they assumed that theparties were only allowed to perform black-box operations over thefinite group G . They showed three results for then -product function f G (x 1 ,...,x n ) : =x 1 ·x 2 ·...·x n ,where the input of party P i isx i ∈ G for i ∈ {1,...,n }. First, if $t \geq \lceil \tfrac{n}{2}\rceil$ then it is impossible to have a t -private protocolcomputing f G . Second, theydemonstrated that one could t -privately compute f G for any $t \leq \lceil \tfrac{n}{2} \rceil -1$ in exponential communication cost. Third, they constructed arandomized algorithm with O (n t 2) communication complexity for anyt≤n/2.948 In this paper, we extend these results in two directions. First,we use percolation theory to show that for any fixede > 0, one can design a randomized algorithm forany $t\leq \frac{n}{2+\epsilon}$ using O (n 3) communication complexity, thus nearly matching theknown upper bound $\lceil \tfrac{n}{2} \rceil - 1$. This is thefirst time that percolation theory is used for multipartycomputation. Second, we exhibit a deterministic construction havingpolynomial communication cost for any t =O (n 1-e ) (again forany fixed e > 0). Our results extend to the moregeneral function $\widetilde{f}_{G}(x_{1},\ldots,x_{m}) := x_{1}\cdot x_{2} \cdot \ldots \cdot x_{m}$ where m ≥n and each of the n parties holds one or moreinput values.

[1]  Oded Goldreich,et al.  How to Solve any Protocol Problem - An Efficiency Improvement , 1987, CRYPTO.

[2]  Martin Hirt,et al.  Robust Multiparty Computation with Linear Communication Complexity , 2006, CRYPTO.

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Ueli Maurer,et al.  Efficient Secure Multi-party Computation , 2000, ASIACRYPT.

[5]  Bart Preneel,et al.  Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .

[6]  Peter W. Shor Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1999 .

[7]  H. Kesten Percolation theory for mathematicians , 1982 .

[8]  Ueli Maurer,et al.  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.

[9]  H. Poincaré,et al.  Percolation ? , 1982 .

[10]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[11]  Choonsik Park,et al.  New Public Key Cryptosystem Using Finite Non Abelian Groups , 2001, CRYPTO.

[12]  Ron Steinfeld,et al.  On Secure Multi-party Computation in Black-Box Groups , 2007, CRYPTO.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  A. J. Menezes,et al.  Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings , 2007, CRYPTO.

[15]  J. Hammersley Percolation Processes: Lower Bounds for the Critical Probability , 1957 .

[16]  Cynthia Dwork,et al.  Advances in Cryptology – CRYPTO 2020: 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III , 2020, Annual International Cryptology Conference.

[17]  Tatsuaki Okamoto,et al.  Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.

[18]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[19]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[20]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[21]  Leonard M. Adleman,et al.  Proof of proposition 3 , 1992 .

[22]  Douglas R. Stinson,et al.  New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups , 2001, Journal of Cryptology.

[23]  Yuval Ishai,et al.  Scalable Secure Multiparty Computation , 2006, CRYPTO.

[24]  Ueli Maurer,et al.  Robustness for Free in Unconditional Multi-party Computation , 2001, CRYPTO.

[25]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[26]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[27]  Carl Pomerance,et al.  Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.