Paper 2024/1285
Robust Multiparty Computation from Threshold Encryption Based on RLWE
Abstract
We consider protocols for secure multi-party computation (MPC) built from FHE under honest majority, i.e., for $n=2t+1$ players of which $t$ are corrupt, that are robust. Surprisingly there exists no robust threshold FHE scheme based on BFV to design such MPC protocols. Precisely, all existing methods for generating a common relinearization key can abort as soon as one player deviates. We address this issue, with a new relinearization key (adapted from [CDKS19, CCS'19]) which we show how to securely generate in parallel of the threshold encryption key, in the same broadcast. We thus obtain the first robust threshold BFV scheme, moreover using only one broadcast for the generation of keys instead of two previously. Of independent interest, as an optional alternative, we propose the first threshold FHE decryption enabling simultaneously: (i) robustness over asynchronous channels with honest majority; (ii) tolerating a power-of-small-prime ciphertext modulus, e.g., $2^e$; and (iii) secret shares of sizes quasi-independent of $n$.
Note: Change log: (a) Addition of an explicit description of the new l-BFV linear FHE scheme
Metadata
- Available format(s)
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Minor revision. ISC 2024
- Keywords
- MPCThreshold FHEThreshold Decryption
- Contact author(s)
- antoine urban @ telecom-paris fr
- History
- 2024-10-11: last of 3 revisions
- 2024-08-15: received
- See all versions
- Short URL
- https://ia.cr/2024/1285
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1285, author = {Antoine Urban and Matthieu Rambaud}, title = {Robust Multiparty Computation from Threshold Encryption Based on {RLWE}}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1285}, year = {2024}, url = {https://eprint.iacr.org/2024/1285} }