Round-efficient black-box construction of composable multi-party computation

16Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

We present a round-efficient black-box construction of a general MPC protocol that satisfies composability in the plain model. The security of our protocol is proven in angel-based UC framework under the minimal assumption of the existence of semi-honest oblivious transfer protocols. When the round complexity of the underlying oblivious transfer protocol is rOT(n), the round complexity of our protocol is max(Õ(log2n), O(r OT(n))). Since constant-round semi-honest oblivious transfer protocols can be constructed under standard assumptions (such as the existence of enhanced trapdoor permutations), our result gives Õ(log 2n)-round protocol under these assumptions. Previously, only an O(max(nε, rOT (n)))-round protocol was shown, where ε > 0 is an arbitrary constant. We obtain our MPC protocol by constructing a Õ(log2n)-round CCA-secure commitment scheme in a black-box way under the assumption of the existence of one-way functions. © 2014 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Kiyoshima, S. (2014). Round-efficient black-box construction of composable multi-party computation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8617 LNCS, pp. 351–368). Springer Verlag. https://doi.org/10.1007/978-3-662-44381-1_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free