Paper 2016/951

Revisiting Covert Multiparty Computation

Geoffroy Couteau

Abstract

Is it feasible for parties to securely evaluate a function on their joint inputs, while hiding not only their private input, but even the very fact that they are taking part to the protocol? This intriguing question was given a positive answer in the two-party case at STOC’05, and in the general case at FOCS’07, under the name of covert multiparty computation (CMPC). A CMPC protocol allows n players with inputs (x1 ···xn) to compute a function f with the following guarantees: – If all the parties are taking part to the protocol, and if the result of the computation is favorable to all the parties, then they get to learn f(x1,··· ,xn) (and nothing more) – Else, when the result is not favorable to all the parties, or if some player does not participate to the computation, no one gets to learn anything (and in particular, no player can learn whether any of the other parties was indeed participating to the protocol) While previous works proved the existence of CMPC under standard assumptions, their candidate CMPC protocols were exclusively of theoretical interest. In this work, we revisit the design of CMPC protocols and show that, perhaps surprisingly, this very strong security notion can be achieved essentially for free. More specifically, we show how to build a CMPC protocol out of a standard, state-of-the-art MPC protocol, where both the communication and the computation are the same than the original protocol, up to an additive factor independent of the size of the circuit. Along the way, we prove two variants of the UC theorem which greatly simplify the design and the security analysis of CMPC protocols.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
Covert multiparty computationMultiparty computationUniversal composability.
Contact author(s)
geoffroy couteau @ ens fr
History
2017-05-25: last of 2 revisions
2016-10-04: received
See all versions
Short URL
https://ia.cr/2016/951
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/951,
      author = {Geoffroy Couteau},
      title = {Revisiting Covert Multiparty Computation},
      howpublished = {Cryptology ePrint Archive, Paper 2016/951},
      year = {2016},
      note = {\url{https://eprint.iacr.org/2016/951}},
      url = {https://eprint.iacr.org/2016/951}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.