## Cryptology ePrint Archive: Report 2016/208

Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions

Sandro Coretti and Juan Garay and Martin Hirt and Vassilis Zikas

Abstract: Constant-Round Asynchronous Multi-Party Computation

Secure multi-party computation (MPC) allows several mutually distrustful parties to securely compute a joint function of their inputs and exists in two main variants: In *synchronous* MPC parties are connected by a synchronous network with a global clock, and protocols proceed in *rounds* with strong delivery guarantees, whereas *asynchronous* MPC protocols can be deployed even in networks that deliver messages in an arbitrary order and impose arbitrary delays on them.

The two models---synchronous and asynchronous---have to a large extent developed in parallel with results on both feasibility and asymptotic efficiency improvements in either track. The most notable gap in this parallel development is with respect to round complexity. In particular, although under standard assumptions on a synchronous communication network (availability of secure channels and broadcast), synchronous MPC protocols with (exact) constant rounds have been constructed, to the best of our knowledge, thus far no constant-round asynchronous MPC protocols are known, with the best protocols requiring a number of rounds that is linear in the multiplicative depth of the arithmetic circuit computing the desired function.

In this work we close this gap by providing the first constant-round asynchronous MPC protocol. Our protocol is optimally resilient (i.e., it tolerates up to $t<n/3$ corrupted parties), adaptively secure, and makes black-box use of a pseudo-random function. It works under the standard network assumptions for protocols in the asynchronous MPC setting, namely, a complete network of point-to-point (secure) asynchronous channels with eventual delivery and asynchronous Byzantine agreement (aka consensus). We provide formal definitions of these primitives and a proof of security in the Universal Composability framework.

Category / Keywords: cryptographic protocols / Multi-Party Computation, Constant-Round Protocols, Asynchronous Model

Date: received 25 Feb 2016, last revised 22 Nov 2016

Contact author: corettis at inf ethz ch

Available format(s): PDF | BibTeX Citation

Short URL: ia.cr/2016/208

[ Cryptology ePrint archive ]