Abstract
One fundamental complexity measure of an MPC protocol is its round complexity. Asharov et al. recently constructed the first three round protocol for general MPC in the CRS model. Here, we show how to achieve this result with only two rounds. We obtain UC security with abort against static malicious adversaries, and fairness if there is an honest majority. Additionally the communication in our protocol is only proportional to the input and output size of the function being evaluated and independent of its circuit size. Our main tool is indistinguishability obfuscation, for which a candidate construction was recently proposed by Garg et al. The technical tools that we develop in this work also imply virtual black box obfuscation of a new primitive that we call a dynamic point function. This primitive may be of independent interest. © 2014 International Association for Cryptologic Research.
Cite
CITATION STYLE
Garg, S., Gentry, C., Halevi, S., & Raykova, M. (2014). Two-round secure MPC from indistinguishability obfuscation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8349 LNAI, pp. 74–94). Springer Verlag. https://doi.org/10.1007/978-3-642-54242-8_4
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.