Paper 2018/894
Perfect Secure Computation in Two Rounds
Benny Applebaum, Zvika Brakerski, and Rotem Tsabary
Abstract
We show that any multi-party functionality can be evaluated using a two-round protocol with perfect correctness and perfect semi-honest security, provided that the majority of parties are honest. This settles the round complexity of information-theoretic semi-honest MPC, resolving a longstanding open question (cf. Ishai and Kushilevitz, FOCS 2000). The protocol is efficient for
Metadata
- Available format(s)
-
PDF
- Publication info
- A major revision of an IACR publication in TCC 2018
- Contact author(s)
- zvika brakerski @ weizmann ac il
- History
- 2020-05-02: last of 2 revisions
- 2018-09-23: received
- See all versions
- Short URL
- https://ia.cr/2018/894
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/894, author = {Benny Applebaum and Zvika Brakerski and Rotem Tsabary}, title = {Perfect Secure Computation in Two Rounds}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/894}, year = {2018}, url = {https://eprint.iacr.org/2018/894} }