### Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments

Tore Kasper Frederiksen, Benny Pinkas, and Avishay Yanai

##### Abstract

We present a new multiparty computation protocol secure against a static and malicious dishonest majority. Unlike most previous protocols that were based on working on MAC-ed secret shares, our approach is based on computations on homomorphic commitments to secret shares. Specifically we show how to realize MPC using any additively-homomorphic commitment scheme, even if such a scheme is an interactive two-party protocol. Our new approach enables us to do arithmetic computation over arbitrary finite fields. In addition, since our protocol computes over committed values, it can be readily composed within larger protocols, and can also be used for efficiently implementing committing OT or committed OT. This is done in two steps, each of independent interest: 1. Black-box extension of any (possibly interactive) two-party additively homomorphic commitment scheme to an additively homomorphic multiparty commitment scheme, only using coin-tossing and a “weak” equality evaluation functionality. 2. Realizing multiplication of multiparty commitments based on a lightweight preprocessing approach. Finally we show how to use the fully homomorphic commitments to compute any functionality securely in the presence of a malicious adversary corrupting any number of parties.

Note: Increased clarity of construction, added a crucial missing piece of related work and fixed a bug occurring in specific settings.

Available format(s)
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in PKC 2018
Keywords
secret sharingcommitmentsmalicious modelsecure computation
Contact author(s)
ay yanay @ gmail com
History
2018-03-21: last of 4 revisions
See all versions
Short URL
https://ia.cr/2017/550

CC BY

BibTeX

@misc{cryptoeprint:2017/550,
author = {Tore Kasper Frederiksen and Benny Pinkas and Avishay Yanai},
title = {Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments},
howpublished = {Cryptology ePrint Archive, Paper 2017/550},
year = {2017},
note = {\url{https://eprint.iacr.org/2017/550}},
url = {https://eprint.iacr.org/2017/550}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.