Paper 2023/1363

Amortized NISC over $\mathbb{Z}_{2^k}$ from RMFE

Fuchun Lin, Shanghai Jiao Tong University
Chaoping Xing, Shanghai Jiao Tong University
Yizhou Yao, Shanghai Jiao Tong University
Chen Yuan, Shanghai Jiao Tong University
Abstract

Reversed multiplication friendly embedding (RMFE) amortization has been playing an active role in the state-of-the-art constructions of MPC protocols over rings (in particular, the ring $\mathbb{Z}_{2^k}$). As far as we know, this powerful technique has NOT been able to find applications in the crown jewel of two-party computation, the non-interactive secure computation (NISC), where the requirement of the protocol being non-interactive constitutes a formidable technical bottle-neck. We initiate such a study focusing on statistical NISC protocols in the VOLE-hybrid model. Our study begins with making the {\em decomposable affine randomized encoding (DARE)} based semi-honest NISC protocol compatible with RMFE techniques, which together with known techniques for forcing a malicious sender Sam to honestly follow DARE already yield a secure amortized protocol, assuming both parties follow RMFE encoding. Achieving statistical security in the full malicious setting is much more challenging, as applying known techniques for enforcing compliance with RMFE incurs interaction. To solve this problem, we put forward a new notion dubbed non-malleable RMFE (NM-RMFE), which is a randomized RMFE such that, once one party deviates from the encoding specification, the randomness injected by the other party will randomize the output, preventing information from being leaked. NM-RMFE simultaneously forces both parties to follow RMFE encoding, offering a desired {\em non-interactive} solution to amortizing NISC. We believe that NM-RMFE is on its own an important primitive that has applications in secure computation and beyond, interactive and non-interactive alike. With an asymptotically good instantiation of our NM-RMFE, we obtain the first {\em statistical} reusable NISC protocols in the VOLE-hybrid model with {\em constant communication overhead} for arithmetic branching programs over $\mathbb{Z}_{2^k}$. As side contributions, we consider computational security and present two concretely efficient NISC constructions in the random oracle model from conventional RMFEs.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in ASIACRYPT 2023
Keywords
secure two-party computationnon-interactive secure computation
Contact author(s)
linfuchun @ sjtu edu cn
xingcp @ sjtu edu cn
yaoyizhou0620 @ sjtu edu cn
chen_yuan @ sjtu edu cn
History
2023-09-13: approved
2023-09-12: received
See all versions
Short URL
https://ia.cr/2023/1363
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2023/1363,
      author = {Fuchun Lin and Chaoping Xing and Yizhou Yao and Chen Yuan},
      title = {Amortized {NISC} over $\mathbb{Z}_{2^k}$ from {RMFE}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2023/1363},
      year = {2023},
      url = {https://eprint.iacr.org/2023/1363}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.