Asynchronous multiparty computation: Theory and implementation

164Citations
Citations of this article
78Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We propose an asynchronous protocol for general multiparty computation. The protocol has perfect security and communication complexity O(n 2|C|k), where n is the number of parties, |C| is the size of the arithmetic circuit being computed, and k is the size of elements in the underlying field. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which no information is released. The communication complexity of this protocol is the same as that of a passively secure solution up to a constant factor. It is secure against an adaptive and active adversary corrupting less than n/3 players. We also present a software framework for implementation of asynchronous protocols called VIFF (Virtual Ideal Functionality Framework), which allows automatic parallelization of primitive operations such as secure multiplications, without having to resort to complicated multithreading. Benchmarking of a VIFF implementation of our protocol confirms that it is applicable to practical non-trivial secure computations. © International Association for Cryptologic Research 2009.

Cite

CITATION STYLE

APA

Damgård, I., Geisler, M., Krøigaard, M., & Nielsen, J. B. (2009). Asynchronous multiparty computation: Theory and implementation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5443, pp. 160–179). Springer Verlag. https://doi.org/10.1007/978-3-642-00468-1_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free