Cryptology ePrint Archive: Report 2019/863

Fast Actively Secure Five-Party Computation with Security Beyond Abort

Megha Byali and Carmit Hazay and Arpita Patra and Swati Singla

Abstract: Secure Multi-party Computation (MPC) with small population and honest majority has drawn focus specifically due to customization in techniques and resulting efficiency that the constructions can offer. In this work, we investigate a wide range of security notions in the five-party setting, tolerating two active corruptions. Being constant-round, our protocols are best suited for real-time, high latency networks such as the Internet.

In a minimal setting of pairwise-private channels, we present efficient instantiations with unanimous abort (where either all honest parties obtain the output or none of them do) and fairness (where the adversary obtains its output only if all honest parties also receive it). With the presence of an additional broadcast channel (known to be necessary), we present a construction with guaranteed output delivery (where any adversarial behaviour cannot prevent the honest parties from receiving the output). The broadcast communication is minimal and independent of circuit size. In terms of performance (communication and run time), our protocols incur minimal overhead over the best known protocol of Chandran et al. (ACM CCS 2016) that achieves the least security notion of selective abort.

Further, our protocols for fairness and unanimous abort can be extended to n-parties with at most $\sqrt{n}$ corruptions, similar to Chandran et al. Going beyond the most popular honest-majority setting of three parties with one corruption, our results demonstrate feasibility of attaining stronger security notions at an expense not too far from the least desired security of selective abort.

Category / Keywords: cryptographic protocols / Secure Multiparty Computation; Guaranteed Output Delivery; Fairness; Unanimous Abort; Garbled Circuits

Original Publication (with major differences): ACM CCS 2019

Date: received 24 Jul 2019, last revised 10 Oct 2019

Contact author: meghabyali at gmail com, megha at iisc ac in, carmit hazay at biu ac il, arpita at iisc ac in, swatis at iisc ac in

Available format(s): PDF | BibTeX Citation

Version: 20191011:045547 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]