### MPC with Synchronous Security and Asynchronous Responsiveness

Chen-Da Liu-Zhang, Julian Loss, Ueli Maurer, Tal Moran, and Daniel Tschudi

##### Abstract

Two paradigms for secure MPC are synchronous and asynchronous protocols. While synchronous protocols tolerate more corruptions and allow every party to give its input, they are very slow because the speed depends on the conservatively assumed worst-case delay $\Delta$ of the network. In contrast, asynchronous protocols allow parties to obtain output as fast as the actual network allows, a property called responsiveness, but unavoidably have lower resilience and parties with slow network connections cannot give input. It is natural to wonder whether it is possible to leverage synchronous MPC protocols to achieve responsiveness, hence obtaining the advantages of both paradigms: full security with responsiveness up to $t$ corruptions, and extended security (full security or security with unanimous abort) with no responsiveness up to $T \ge t$ corruptions. We settle the question by providing matching feasibility and impossibility results: -For the case of unanimous abort as extended security, there is an MPC protocol if and only if $T + 2t < n$. -For the case of full security as extended security, there is an MPC protocol if and only if $T < n/2$ and $T + 2t < n$. In particular, setting $t = n/4$ allows to achieve a fully secure MPC for honest majority, which in addition benefits from having substantial responsiveness.

Available format(s)
Category
Cryptographic protocols
Publication info
A minor revision of an IACR publication in Asiacrypt 2020
Keywords
secure multiparty computationbyzantine agreementsynchronousasynchronousresponsiveness
Contact author(s)
lichen @ inf ethz ch
History
2020-10-08: last of 3 revisions
See all versions
Short URL
https://ia.cr/2019/159

CC BY

BibTeX

@misc{cryptoeprint:2019/159,
author = {Chen-Da Liu-Zhang and Julian Loss and Ueli Maurer and Tal Moran and Daniel Tschudi},
title = {MPC with Synchronous Security and Asynchronous Responsiveness},
howpublished = {Cryptology ePrint Archive, Paper 2019/159},
year = {2019},
note = {\url{https://eprint.iacr.org/2019/159}},
url = {https://eprint.iacr.org/2019/159}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.