Paper 2024/1347

Secure Multiparty Computation with Lazy Sharing

Shuaishuai Li, Zhongguancun Laboratory, Beijing, China
Cong Zhang, Institute for Advanced Study, BNRist, Tsinghua University, Beijing, China
Dongdai Lin, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
Abstract

Secure multiparty computation (MPC) protocols enable $n$ parties, each with private inputs, to compute a given function without leaking information beyond the outputs. One of the main approaches to designing efficient MPC protocols is to use secret sharing. In general, secret sharing based MPC contains three phases: input sharing, circuit evaluation, and output recovery. If the adversary corrupts at most $t$ parties, the protocol typically uses $(t,n)$ threshold secret sharing to share the inputs. In this work, we consider a weaker variant of threshold secret sharing called lazy threshold secret sharing (or simply lazy sharing) and show that - Lazy sharing can serve as a viable alternative to threshold secret sharing in MPC without compromising security. - Lazy sharing could be generated more efficiently than threshold secret sharing. As a result, replacing threshold secret sharing with lazy sharing can lead to a more efficient input sharing phase. Moreover, we propose that the efficiency of the circuit evaluation phase can also be further improved. To support this claim, we apply lazy sharing to several state-of-the-art MPC protocols and analyze the efficiency gain in various settings. These protocols include the GMW protocol (Goldreich et al., STOC 1987), the AFLNO protocol (Araki et al., CCS 2016), and the SPDZ protocol (Damg{\aa}rd et al., CRYPTO 2012). By doing so, we analyze the efficiency gains in various settings and highlight the advantages of incorporating lazy sharing into MPC protocols.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. ACM CCS 2024
Contact author(s)
liss @ zgclab edu cn
zhangcong @ mail tsinghua edu cn
ddlin @ iie ac cn
History
2024-08-30: last of 2 revisions
2024-08-28: received
See all versions
Short URL
https://ia.cr/2024/1347
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1347,
      author = {Shuaishuai Li and Cong Zhang and Dongdai Lin},
      title = {Secure Multiparty Computation with Lazy Sharing},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1347},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1347}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.