Nothing Special   »   [go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2024/1701

Secure Computation with Parallel Calls to 2-ary Functions

Varun Narayanan, University of California, Los Angeles
Shubham Vivek Pawar, Royal Holloway University of London
Akshayaram Srinivasan, University of Toronto
Abstract

Reductions are the workhorses of cryptography. They allow constructions of complex cryptographic primitives from simple building blocks. A prominent example is the non-interactive reduction from securely computing a ``complex" function $f$ to securely computing a ``simple" function $g$ via randomized encodings. Prior work equated simplicity with functions of small degree. In this work, we consider a different notion of simplicity where we require $g$ to only take inputs from a small number of parties. In other words, we want the arity of $g$ to be as small as possible. In more detail, we consider the problem of reducing secure computation of arbitrary functions to secure computation of functions with arity two (two is the minimal arity required to compute non-trivial functions). Specifically, we want to compute a function $f$ via a protocol that makes parallel calls to 2-ary functions. We want this protocol to be secure against malicious adversaries that could corrupt an arbitrary number of parties. We obtain the following results: - Negative Result: We show that there exists a degree-2 polynomial $p$ such that no protocol that makes parallel calls to 2-ary functions can compute $p$ with statistical security with abort. - Positive Results: We give two ways to bypass the above impossibility result. 1. Weakening the Security Notion. We show that every degree-2 polynomial can be computed with statistical privacy with knowledge of outputs (PwKO) by making parallel calls to 2-ary functions. Privacy with knowledge of outputs is weaker than security with abort. 2. Computational Security. We prove that for every function $f$, there exists a protocol for computing $f$ that makes parallel calls to 2-ary functions and achieves security with abort against computationally-bounded adversaries. The security of this protocol relies on the existence of semi-honest secure oblivious transfer. - Applications: We give connections between this problem and the task of reducing the encoding complexity of Multiparty Randomized Encodings (MPRE) (Applebaum, Brakerski, and Tsabary, TCC 2018). Specifically, we show that under standard computational assumptions, there exists an MPRE where the encoder can be implemented by an $\mathrm{NC}^0$ circuit with constant fan-out. - Extensions: We explore this problem in the honest majority setting and give similar results assuming one-way functions. We also show that if the parties have access to 3-ary functions then we can construct a computationally secure protocol in the dishonest majority setting assuming one-way functions.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A major revision of an IACR publication in TCC 2024
Keywords
Secure Multiparty ComputationInformation Theoretic SecurityRandomized Encodings
Contact author(s)
varunnkv @ gmail com
shubham pawar 2022 @ live rhul ac uk
akshayaram @ cs toronto edu
History
2024-10-21: approved
2024-10-18: received
See all versions
Short URL
https://ia.cr/2024/1701
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1701,
      author = {Varun Narayanan and Shubham Vivek Pawar and Akshayaram Srinivasan},
      title = {Secure Computation with Parallel Calls to 2-ary Functions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1701},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1701}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.