Cryptology ePrint Archive: Report 2016/048

Better Preprocessing for Secure Multiparty Computation

Carsten Baum and Ivan Damgård and Tomas Toft and Rasmus Zakarias

Abstract: We present techniques and protocols for the preprocessing of secure multiparty computation (MPC), focusing on the so-called SPDZ MPC scheme SPDZ and its derivatives. These MPC schemes consist of a so-called preprocessing or offline phase where correlated randomness is generated that is independent of the inputs and the evaluated function, and an online phase where such correlated randomness is consumed to securely and efficiently evaluate circuits. In the recent years, it has been shown that such protocols turn out to be very efficient in practice. While much research has been conducted towards optimizing the online phase of the MPC protocols, there seems to have been less focus on the offline phase of such protocols. With this work, we want to close this gap and give a toolbox of techniques that aim at optimizing the preprocessing.

We support both instantiations over small fields and large rings using somewhat homomorphic encryption and the Paillier cryptosystem, respectively. In the case of small fields, we show how the preprocessing overhead can basically be made independent of the field characteristic and present a more efficient (amortized) zero-knowledge proof of plaintext knowledge. In the case of large rings, we present a protocol based on the Paillier cryptosystem which has a lower message complexity than previous protocols and employs more efficient zero-knowledge proofs that, to the best of our knowledge, were not presented in previous work.

Category / Keywords: cryptographic protocols / Efficient Multiparty Computation, Preprocessing, Homomorphic Encryption, Paillier Encryption

Original Publication (with major differences): 14th International Conference on Applied Cryptography and Network Security (ACNS 2016)

Date: received 19 Jan 2016, last revised 26 Sep 2016

Contact author: cbaum at cs au dk

Available format(s): PDF | BibTeX Citation

Note: Revised full version of the article with some additional material.

Version: 20160926:075710 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]