Cryptology ePrint Archive: Report 2014/830
Adaptively Secure UC Constant Round Multi-Party Computation
Ivan Damgård and Antigoni Polychroniadou and Vanishree Rao
Abstract: We present a universally composable multiparty computation protocol that is adaptively secure against corruption of n-1 of the n players. The protocol has a constant number of rounds and communication complexity that depends only on the number of inputs and outputs (and not on the size of the circuit to be computed securely). Such protocols were already known for honest majority. However, adaptive security and constant round was known to be impossible in the stand-alone model and with black-box proofs of security. Here, we solve the problem in the UC model using a set-up assumption. Our protocol is secure assuming LWE is hard and achieved by building a special type of crypto system we call equivocal FHE from LWE. We also build adaptively secure and constant round UC commitment and zero-knowledge proofs (of knowledge) based on LWE.
Category / Keywords: MPC, adaptive security, LWE, FHE
Date: received 12 Oct 2014, last revised 5 Nov 2014
Contact author: antigoni at cs au dk
Available format(s): PDF | BibTeX Citation
Version: 20141105:141653 (All versions of this report)
Short URL: ia.cr/2014/830
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]