TY - GEN
T1 - Share&Shrink
T2 - 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025
AU - Urban, Antoine
AU - Rambaud, Matthieu
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
PY - 2025/1/1
Y1 - 2025/1/1
N2 - We consider protocols for secure multi-party computation (MPC) under honest majority, i.e., for n=2t+1 players of which t are corrupt, that achieve guaranteed output delivery (GOD), and operate in a single initial round of broadcast (BC), followed by steps of asynchronous peer-to-peer (P2P) messages. The power of closely related “hybrid networks” was studied in [Fitzi-Nielsen, Disc’09], [BHN, Podc’10] and [Patra-Ravi, IEEE Tr. Inf. Theory’18]. The interest of such protocols is that they go at the actual speed of the network, and security is preserved under arbitrary network conditions (past the initial BC). We first consider a bare bulletin-board PKI setup, and leverage recent advances in multi-key homomorphic encryption [BJMS, Asiacrypt’20], to state the feasibility of honest majority MPC with GOD in a tight 1-BC-then-1 single step of asynchronous P2P messages. We then consider efficiency. The only protocols adaptable to such a network model and setup are [BJMS, Asiacrypt’20], which does not scale well for many players, and [GLS, Crypto’15], which does not support input delegation from external resource-constrained owners (such as IoT devices or smartphones), limiting its practical use. Our main contribution is a generic design that enables MPC in 1BC-then-asynchronous P2P. It operates over ciphertexts encrypted under a (threshold) single-key encryption scheme, resulting in the smallest sizes expectable and efficient evaluation. It can be implemented from any homomorphic encryption scheme built from linear maps (e.g., GSW, CL, ...). Our main building block is the squishing of the verifiable input sharing (“Share”), in parallel with the distributed key generation (DKG) in the single BC, followed by threshold encryption (“Shrink”) in one asynchronous step. Interestingly, it can be compiled into the first constant-round YOSO protocol in 1 BC.
AB - We consider protocols for secure multi-party computation (MPC) under honest majority, i.e., for n=2t+1 players of which t are corrupt, that achieve guaranteed output delivery (GOD), and operate in a single initial round of broadcast (BC), followed by steps of asynchronous peer-to-peer (P2P) messages. The power of closely related “hybrid networks” was studied in [Fitzi-Nielsen, Disc’09], [BHN, Podc’10] and [Patra-Ravi, IEEE Tr. Inf. Theory’18]. The interest of such protocols is that they go at the actual speed of the network, and security is preserved under arbitrary network conditions (past the initial BC). We first consider a bare bulletin-board PKI setup, and leverage recent advances in multi-key homomorphic encryption [BJMS, Asiacrypt’20], to state the feasibility of honest majority MPC with GOD in a tight 1-BC-then-1 single step of asynchronous P2P messages. We then consider efficiency. The only protocols adaptable to such a network model and setup are [BJMS, Asiacrypt’20], which does not scale well for many players, and [GLS, Crypto’15], which does not support input delegation from external resource-constrained owners (such as IoT devices or smartphones), limiting its practical use. Our main contribution is a generic design that enables MPC in 1BC-then-asynchronous P2P. It operates over ciphertexts encrypted under a (threshold) single-key encryption scheme, resulting in the smallest sizes expectable and efficient evaluation. It can be implemented from any homomorphic encryption scheme built from linear maps (e.g., GSW, CL, ...). Our main building block is the squishing of the verifiable input sharing (“Share”), in parallel with the distributed key generation (DKG) in the single BC, followed by threshold encryption (“Shrink”) in one asynchronous step. Interestingly, it can be compiled into the first constant-round YOSO protocol in 1 BC.
KW - Homomorphic Encryption
KW - MPC
KW - Verifiable Computation
KW - Yoso
UR - https://www.scopus.com/pages/publications/105009799310
U2 - 10.1007/978-3-031-95761-1_11
DO - 10.1007/978-3-031-95761-1_11
M3 - Conference contribution
AN - SCOPUS:105009799310
SN - 9783031957604
T3 - Lecture Notes in Computer Science
SP - 308
EP - 338
BT - Applied Cryptography and Network Security - 23rd International Conference, ACNS 2025, Proceedings
A2 - Fischlin, Marc
A2 - Moonsamy, Veelasha
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 23 June 2025 through 26 June 2025
ER -