Information Security and Cryptography Research Group

Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience

Martin Hirt, Jesper Buus Nielsen, and Bartosz Przydatek

Advances in Cryptology — EUROCRYPT 2005, Lecture Notes in Computer Science, Springer-Verlag, vol. 3494, pp. 322–340, May 2005, Full version available as Report 2004/368 at Cryptology ePrint Archive, http://eprint.iacr.org/2004/368.

We consider secure multi-party computation in the asynchronous model and present an efficient protocol with optimal resilience. For $n$ parties, up to $t<n/3$ of them being corrupted, and security parameter $\kappa$, a circuit with $c$ gates can be securely computed with communication complexity $\O(c n^3 \kappa)$ bits. In contrast to all previous asynchronous protocols with optimal resilience, our protocol requires access to an expensive broadcast primitive only $\O(n)$ times — independently of the size $c$ of the circuit. This results in a practical protocol with a very low communication overhead.

One major drawback of a purely asynchronous network is that the inputs of up to $t$ honest parties cannot be considered for the evaluation of the circuit. Waiting for all inputs could take infinitely long when the missing inputs belong to corrupted parties. Our protocol can easily be extended to a hybrid model, in which we have one round of synchronicity at the end of the input stage, but are fully asynchronous afterwards. In this model, our protocol allows to evaluate the circuit on the inputs of every honest party.

BibTeX Citation

@inproceedings{HiNiPr05,
    author       = {Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek},
    title        = {Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience},
    editor       = {Ronald Cramer},
    booktitle    = {Advances in Cryptology --- EUROCRYPT 2005},
    pages        = 322--340,
    series       = {Lecture Notes in Computer Science},
    volume       = 3494,
    year         = 2005,
    month        = 5,
    note         = {Full version available as Report 2004/368 at Cryptology ePrint Archive, http://eprint.iacr.org/2004/368},
    publisher    = {Springer-Verlag},
}

Files and Links