1 research outputs found

    Communication Lower Bounds for Perfect Maliciously Secure MPC

    Get PDF
    We prove a lower bound on the communication complexity of perfect maliciously secure multiparty computation, in the standard model with n=3t+1n=3t+1 parties of which tt are corrupted. We show that for any nn and all large enough gNg \in \mathbb{N} there exists a Boolean circuit CC with gg gates, where any perfectly secure protocol implementing CC must communicate Ω(ng)\Omega(n g) bits. The results easily extends to constructing similar circuits over any fixed finite field. Our results also extend to the case where the threshold tt is suboptimal. Namely if n=3t+sn= 3t+s the bound is Ω(ng/s)\Omega(ng/s), which corresponds to known optimizations via packed secret-sharing. Using known techniques, we also show an upper bound that matches the lower bound up to a constant factor (existing upper bounds are a factor logn\log n off for Boolean circuits)
    corecore