[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2024/1717

Practical Asynchronous MPC from Lightweight Cryptography

Atsuki Momose, Quitee Research
Abstract

We present an asynchronous secure multi-party computation (MPC) protocol that is practically efficient. Our protocol can evaluate any arithmetic circuit with linear communication in the number of parties per multiplication gate, while relying solely on computationally lightweight cryptography such as hash function and symmetric encryption. Our protocol is optimally resilient and tolerates $t$ malicious parties among $n = 3t+1$ parties. At the technical level, we manage to apply the \emph{player-elimination} paradigm to asynchronous MPC. This framework enables the detection and eviction of cheating parties by repeatedly attempting to generate Beaver triples. Once all malicious parties are eliminated, honest parties can proceed with efficient Beaver triple generation. While this approach is standard in synchronous MPC, it presents several technical challenges when adopted in an asynchronous network, which we address in this work.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
MPCAsynchronous
Contact author(s)
atsuki momose @ gmail com
History
2024-10-21: approved
2024-10-21: received
See all versions
Short URL
https://ia.cr/2024/1717
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1717,
      author = {Atsuki Momose},
      title = {Practical Asynchronous {MPC} from Lightweight Cryptography},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1717},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1717}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.