Zuzana Beerliova-Trubiniova, Martin Hirt, and Jesper Buus Nielsen
Abstract
Secure multiparty computation (MPC) allows a set of parties to
securely evaluate any agreed function of their inputs, even when up
to of the parties are faulty. Protocols for synchronous
networks (where every sent message is assumed to arrive within a
constant time) tolerate up to faulty parties, whereas in the
more realistic asynchronous setting (with no \emph{a priory}
information on maximal message delay) only security against
is possible. We present the first protocol that achieves security
against without assuming a fully synchronous network.
Actually our protocol guarantees security against any faulty
minority in an \emph{almost asynchronous} network, i.e. in a network
with one single round of synchronous broadcast (followed by a fully
asynchronous communication). Furthermore our protocol takes inputs
of all parties (in a fully asynchronous network only inputs of
parties can be guaranteed), and so achieves everything that is
possible in synchronous networks (but impossible in fully
asynchronous networks) at the price of just one synchronous
broadcast round.
As tools for our protocol we introduce the notions of \emph{almost
non-interactive verifiable secret-sharing} and \emph{almost
non-interactive zero-knowledge proof of knowledge}, which are of
independent interest as they can serve as efficient replacements for
fully non-interactive verifiable secret-sharing and fully
non-interactive zero-knowledge proof of knowledge.
@misc{cryptoeprint:2008/416,
author = {Zuzana Beerliova-Trubiniova and Martin Hirt and Jesper Buus Nielsen},
title = {Almost-Asynchronous {MPC} with Faulty Minority},
howpublished = {Cryptology {ePrint} Archive, Paper 2008/416},
year = {2008},
url = {https://eprint.iacr.org/2008/416}
}
Note: In order to protect the privacy of readers, eprint.iacr.org
does not use cookies or embedded third party content.