Abstract | ||
---|---|---|
In this work, we study the communication complexity of secure multiparty computation under minimal assumptions in the presence of an adversary that can adaptively corrupt all parties eventually. Specifically, we are interested in understanding the complexity when modeling the underlying function as a RAM program. Under minimal assumptions, the work of Canetti et al. (STOC 2017) and Benhamouda et al. (TCC 2018) give protocols whose communication complexity grows quadratically in the circuit size when the computation is expressed as a Boolean circuit. In this work, we obtain the first two-round two-party computation protocol, which is secure against adaptive adversaries who can adaptively corrupt all parties where the communication complexity is proportional to the square of the RAM complexity of the function up to polylogarithmic factors assuming the existence of non-committing encryption. |
Year | DOI | Venue |
---|---|---|
2022 | 10.1007/978-3-031-07085-3_7 | ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II |
Keywords | DocType | Volume |
Adaptive security, Garbled RAM, Secure computation, Oblivious RAM | Conference | 13276 |
ISSN | Citations | PageRank |
0302-9743 | 0 | 0.34 |
References | Authors | |
0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Laasya Bangalore | 1 | 0 | 0.34 |
Rafail Ostrovsky | 2 | 0 | 1.01 |
Oxana Poburinnaya | 3 | 0 | 0.34 |
Muthuramakrishnan Venkitasubramaniam | 4 | 0 | 0.34 |