Perfectly-Secure MPC in the Pre-processing Model

  • Chapter
  • First Online:
Secure Multi-Party Computation Against Passive Adversaries

Part of the book series: Synthesis Lectures on Distributed Computing Theory ((SLDCT))

  • 170 Accesses

Abstract

In this chapter, we discuss how one can improve the efficiency of the BGW protocol in the pre-processing model, where parties are allowed to generate correlated randomness in advance, independent of the circuit-evaluation. We discuss two classes of protocols in the pre-processing model, one based on Beaver’s random multiplication-triples and another based on random double-shared values.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 46.00
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 58.84
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 58.84
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    There can be various forms of correlated randomness and in this chapter, we discuss two of them.

  2. 2.

    Recall that \(t < n/2\) is the optimal threshold for any t-perfectly-secure protocol for arbitrary functions.

  3. 3.

    Note that the use of a multiplication protocol requires the condition \(t < n/2\) to hold.

  4. 4.

    The term double-share here signifies that each party holds two shares, one corresponding to t-Shamir-sharing of s and another corresponding to 2t-Shamir-sharing of s. We use different fonts, to differentiate between the two types of shares.

  5. 5.

    A formula is a special type of circuit where each gate has fan-out at most 1. They represent computation where the results of subcomputations cannot be used more than once.

  6. 6.

    Recall that to generate a (t, 2t)-double-sharing of a value, the corresponding dealer has to share the same value twice, using t and 2t-degree polynomials.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashish Choudhury .

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Choudhury, A., Patra, A. (2022). Perfectly-Secure MPC in the Pre-processing Model. In: Secure Multi-Party Computation Against Passive Adversaries. Synthesis Lectures on Distributed Computing Theory. Springer, Cham. https://doi.org/10.1007/978-3-031-12164-7_7

Download citation

Publish with us

Policies and ethics

Navigation