Recently, Desmedt et al. studied the problem of achieving secure n-party computation over non-Abelian groups. They considered the passive adversary model and they assumed that the parties were only allowed to perform black-box operations over the finite group G. They showed three results for the n-product function f G (x 1,...,x n ) :∈=∈x 1 •x 2 •...•x n , where the input of party P i is x i ∈ ∈G for i∈ ∈{1,...,n}. First, if then it is impossible to have a t-private protocol computing f G . Second, they demonstrated that one could t-privately compute f G for any in exponential communication cost. Third, they constructed a randomized algorithm with O(n t 2) communication complexity for any . In this paper, we extend these results in two directions. First, we use percolation theory to show that for any fixed ε>∈0, one can design a randomized algorithm for any using O(n 3) communication complexity, thus nearly matching the known upper bound . This is the first time that percolation theory is used for multiparty computation. Second, we exhibit a deterministic construction having polynomial communication cost for any t∈=∈O(n 1∈-∈ε ) (again for any fixed ε>∈0). Our results extend to the more general function where m∈≥∈n and each of the n parties holds one or more input values. © 2008 Springer Berlin Heidelberg.
CITATION STYLE
Sun, X., Yao, A. C. C., & Tartary, C. (2008). Graph design for secure multiparty computation over non-Abelian groups. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5350 LNCS, pp. 37–53). https://doi.org/10.1007/978-3-540-89255-7_3
Mendeley helps you to discover research relevant for your work.