Research output: Contribution to book/anthology/report/proceeding › Article in proceedings › Research › peer-review

- https://doi.org/10.1007/978-3-662-54388-7_13
Final published version

- Jesper Buus Nielsen
- Samuel Ranellucci, Department of Computer Science, George Mason University, Department of Computer Science, University of Maryland, Maryland, USA

We consider the situation where a large number n of players want to securely compute a large function f with security against an adaptive, malicious adversary which might corrupt t < cn of the parties for some given c ∈ [0, 1). In other words, only some arbitrarily small constant fraction of the parties are assumed to be honest. For any fixed c, we consider the asymptotic complexity as n and the size of f grows. We are in particular interested in the computational overhead, defined as the total computational complexity of all parties divided by the size of f. We show that it is possible to achieve poly-logarithmic computational overhead for all c < 1. Prior to our result it was only known how to get poly-logarithmic overhead for c < 1/2. We therefore significantly extend the area where we can do secure multiparty computation with polylogarithmic overhead. Since we allow that more than half the parties are corrupted, we can only get security with abort, i.e., the adversary might make the protocol abort before all parties learn their outputs. We can, however, for all c make a protocol for which there exists d > 0 such that if at most dn parties are actually corrupted in a given execution, then the protocol will not abort. Our result is solely of theoretical interest. In its current form, it has not practical implications whatsoever.

Original language | English |
---|---|

Title of host publication | Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings |

Editors | Serge Fehr |

Number of pages | 27 |

Volume | 10175 |

Place of publication | Berlin Heidelberg |

Publisher | Springer VS |

Publication year | 2017 |

Pages | 369-395 |

ISBN (print) | 9783662543870 |

ISBN (Electronic) | 978-3-662-54388-7 |

DOIs | |

Publication status | Published - 2017 |

Event | 20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017 - Amsterdam, Netherlands Duration: 28 Mar 2017 → 31 Mar 2017 |

Conference | 20th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2017 |
---|---|

Land | Netherlands |

By | Amsterdam |

Periode | 28/03/2017 → 31/03/2017 |

Sponsor | International Association for Cryptologic Research (IACR) |

Series | Lecture Notes in Computer Science |
---|---|

Volume | 10175 |

ISSN | 0302-9743 |

See relations at Aarhus University Citationformats

ID: 118501150