International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Two-Round Maliciously Secure Computation with Super-Polynomial Simulation

Authors:
Amit Agarwal
James Bartusek
Vipul Goyal
Dakshita Khurana
Giulio Malavolta
Download:
DOI: 10.1007/978-3-030-90459-3_22
Search ePrint
Search Google
Abstract: We propose the first maliciously secure multi-party computation (MPC) protocol for general functionalities in two rounds, without any trusted setup. Since polynomial-time simulation is impossible in two rounds, we achieve the relaxed notion of superpolynomial-time simulation security [Pass, EUROCRYPT 2003]. Prior to our work, no such maliciously secure protocols were known even in the two-party setting for functionalities where both parties receive outputs. Our protocol is based on the sub-exponential security of standard assumptions plus a special type of non-interactive non-malleable commitment. At the heart of our approach is a two-round multi-party conditional disclosure of secrets (MCDS) protocol in the plain model from bilinear maps, which is constructed from techniques introduced in [Benhamouda and Lin, TCC 2020].
Video from TCC 2021
BibTeX
@article{tcc-2021-31512,
  title={Two-Round Maliciously Secure Computation with Super-Polynomial Simulation},
  booktitle={Theory of Cryptography;19th International Conference},
  publisher={Springer},
  doi={10.1007/978-3-030-90459-3_22},
  author={Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta},
  year=2021
}