Cryptology ePrint Archive: Report 2018/148

The Complexity of Multiparty PSM Protocols and Related Models

Amos Beimel and Eyal Kushilevitz and Pnina Nissim

Abstract: We study the efficiency of computing arbitrary k-argument functions in the Private Simultaneous Messages (PSM) model of (Feige et al. STOC'94, Ishai and Kushilevitz ISTCS'97). This question was recently studied by (Beimel et al. TCC'14), in the two-party case (k = 2). We tackle this question in the general case of PSM protocols for k > 2 parties. Our motivation is two-fold: On one hand, there are various applications (old and new) of PSM protocols for constructing other cryptographic primitives, where obtaining more efficient PSM protocols imply more efficient primitives. On the other hand, improved PSM protocols are an interesting goal on its own. In particular, we pay a careful attention to the case of small number of parties (e.g., k = 3,4, 5), which may be especially interesting in practice, and optimize our protocols for those cases.

Our new upper bounds include a k-party PSM protocol, for any k > 2 and any function f : [N]^k --> {0; 1}, of complexity O(poly(k) N^{k/2}) (compared to the previous upper bound of O(poly(k) N^{k-1})), and even better bounds for small values of k; e.g., an O(N) PSM protocol for the case k = 3. We also handle the more involved case where different parties have inputs of different sizes, which is useful both in practice and for applications.

As applications, we obtain more efficient Non-Interactive secure Multi-Party (NIMPC) protocols (a variant of PSM, where some of the parties may collude with the referee (Beimel et al. CRYPTO'14)), improved ad-hoc PSM protocols (another variant of PSM, where the subset of participating parties is not known in advance (Beimel et al. ITCS'16, Beimel et al. EUROCRYPT'17)), secret-sharing schemes for strongly-homogeneous access structures with smaller share size than previously known, and better homogeneous distribution designs (Beimel et al. ITCS'16), a primitive with many cryptographic applications on its own.

Category / Keywords: cryptographic protocols / Private Simultaneous Messages Protocols, Secure Multi-Party Computation, Conditional Disclosure of Secrets, Communication Complexity

Original Publication (in the same form): IACR-EUROCRYPT-2018

Date: received 7 Feb 2018, last revised 8 Feb 2018

Contact author: amos beimel at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20180208:163759 (All versions of this report)

Short URL: ia.cr/2018/148

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]