4 research outputs found

    Guaranteed Output Delivery Comes Free in Honest Majority MPC

    Get PDF
    We study the communication complexity of unconditionally secure MPC with guaranteed output delivery over point-to-point channels for corruption threshold t < n/2, assuming the existence of a public broadcast channel. We ask the question: “is it possible to construct MPC in this setting s.t. the communication complexity per multiplication gate is linear in the number of parties?” While a number of works have focused on reducing the communication complexity in this setting, the answer to the above question has remained elusive until now. We also focus on the concrete communication complexity of evaluating each multiplication gate. We resolve the above question in the affirmative by providing an MPC with communication complexity O(Cn\phi) bits (ignoring fixed terms which are independent of the circuit) where \phi is the length of an element in the field, C is the size of the (arithmetic) circuit, n is the number of parties. This is the first construction where the asymptotic communication complexity matches the best-known semi-honest protocol. This represents a strict improvement over the previously best-known communication complexity of O(C(n\phi+\kappa)+D_Mn^2\kappa) bits, where \kappa is the security parameter and D_M is the multiplicative depth of the circuit. Furthermore, the concrete communication complexity per multiplication gate is 5.5 field elements per party in the best case and 7.5 field elements in the worst case when one or more corrupted parties have been identified. This also roughly matches the best-known semi-honest protocol, which requires 5.5 field elements per gate

    Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs

    Get PDF
    Secure computation protocols enable mutually distrusting parties to compute a function of their private inputs while revealing nothing but the output. Protocols with {\em full security} (also known as {\em guaranteed output delivery}) in particular protect against denial-of-service attacks, guaranteeing that honest parties receive a correct output. This feature can be realized in the presence of an honest majority, and significant research effort has gone toward attaining full security with good asymptotic and concrete efficiency. We present an efficient protocol for {\em any constant} number of parties nn, with {\em full security} against t<n/2t<n/2 corrupted parties, that makes a black-box use of a pseudorandom generator. Our protocol evaluates an arithmetic circuit CC over a finite ring RR (either a finite field or R=Z2kR=\Z_{2^k}) with communication complexity of 3t2t+1S+o(S)\frac{3t}{2t+1}S + o(S) RR-elements per party, where SS is the number of multiplication gates in CC (namely, <1.5<1.5 elements per party per gate). This matches the best known protocols for the semi-honest model up to the sublinear additive term. For a small number of parties nn, this improves over a recent protocol of Goyal {\em et al.} (Crypto 2020) by a constant factor for circuits over large fields, and by at least an Ω(logn)\Omega(\log n) factor for Boolean circuits or circuits over rings. Our protocol provides new methods for applying the sublinear-communication distributed zero-knowledge proofs of Boneh {\em et al.}~(Crypto 2019) for compiling semi-honest protocols into fully secure ones, in the more challenging case of t>1t>1 corrupted parties. Our protocol relies on {\em replicated secret sharing} to minimize communication and simplify the mechanism for achieving full security. This results in computational cost that scales exponentially with nn. Our main fully secure protocol builds on a new intermediate honest-majority protocol for verifying the correctness of multiplication triples by making a {\em general} use of distributed zero-knowledge proofs. While this intermediate protocol only achieves the weaker notion of {\em security with abort}, it applies to any linear secret-sharing scheme and provides a conceptually simpler, more general, and more efficient alternative to previous protocols from the literature. In particular, it can be combined with the Fiat-Shamir heuristic to simultaneously achieve logarithmic communication complexity and constant round complexity

    Legal plurality in Mekong hydropower: its emergence and policy implications

    No full text
    The changing role of the state and the increased participation of non-state actors has blurred the meaning of international affairs and highlighted overlapping power structures at international, national, and local levels. This paper illustrates how these power structures shape the hydropower decision making landscape in one of the world’s most dynamic transboundary basins, the Mekong. Using the Lao PDR as a case study, we highlight how international donors’ influence in the overall shaping of national policy and legal frameworks, the state’s positioning of hydropower development as the main source of revenue, and the emerging importance of private sector actors manifested in overlapping rules and legal plurality in hydropower decision making. While legal plurality reflects the inherently contested terrain of hydropower, it also highlights the importance of power geometries and the scale dynamics in hydropower governance. The growing role of non-state actors may be interpreted as a reduction in state decision making power, but it may also be seen as a means for the state to take advantage of competing interests, in this case receiving both donor funding and private capital. If international donors expect national government agencies to promote meaningful application of internationally defined socio-environmental safeguards, they need to create space for critical discussion and move beyond the current standardized approach in promoting sustainable hydropower development
    corecore