Paper 2024/370
Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus
Daniel Escudero, J.P. Morgan AI Research & J.P. Morgan AlgoCRYPT CoE
Yifan Song, Institute for Theoretical Computer Science, Institute for Interdisciplinary Information Sciences, Tsinghua University, Shanghai Qi Zhi Institute
Wenhao Wang, Yale University
Abstract
Consider the task of secure multiparty computation (MPC) among parties with perfect security and guaranteed output delivery, supporting active corruptions. Suppose the arithmetic circuit to be computed is defined over a finite ring , for an arbitrary . It is known that this type of MPC over such ring is possible, with communication that scales as , assuming that scales as . However, for constant-size rings where , the communication is actually due to the need of the so-called ring extensions. In most natural settings, the number of parties is variable but the "datatypes" used for the computation are fixed (e.g. 64-bit integers). In this regime, no protocol with linear communication exists.
In this work we provide an MPC protocol in this setting: perfect security, G.O.D. and active corruptions, that enjoys linear communication , even for constant-size rings . This includes as important particular cases small fields such as , and also the ring . The main difficulty in achieving this result is that widely used techniques such as linear secret-sharing cannot work over constant-size rings, and instead, one must make use of ring extensions that add overhead, while packing ring elements in each extension element in order to amortize this cost. We make use of reverse multiplication-friendly embeddings (RMFEs) for this packing, and adapt recent techniques in network routing (Goyal et al. CRYPTO'22) to ensure this can be efficiently used for non-SIMD circuits. Unfortunately, doing this naively results in a restriction on the minimum width of the circuit, which leads to an extra additive term in communication of . One of our biggest technical contributions lies in designing novel techniques to overcome this limitation by packing elements that are distributed across different layers. To the best of our knowledge, all works that have a notion of packing (e.g. RMFE or packed secret-sharing) group gates across the same layer, and not doing so, as in our work, leads to a unique set of challenges and complications.