On 2-round secure multiparty computation

Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

38 Scopus citations

Abstract

Substantial efforts have been spent on characterizing the round complexity of various cryptographic tasks. In this work we study the round complexity of secure multiparty computation in the presence of an active (Byzantine) adversary, assuming the availability of secure point-to-point channels and a broadcast primitive. It was recently shown that in this setting three rounds are sufficient for arbitrary secure computation tasks, with a linear security threshold, and two rounds are sufficient for certain nontrivial tasks. This leaves open the question whether every function can be securely computed in two rounds. We show that the answer to this question is “no”: even some very simple functions do not admit secure 2-round protocols (independently of their communication and time complexity) and thus 3 is the exact round complexity of general secure multiparty computation. Yet, we also present some positive results by identifying a useful class of functions which can be securely computed in two rounds. Our results apply both to the information-theoretic and to the computational notions of security.

Original languageEnglish
Title of host publicationAdvances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings
EditorsMoti Yung
Pages178-193
Number of pages16
ISBN (Electronic)354044050X, 9783540440505
DOIs
StatePublished - 2002
Event22nd Annual International Cryptology Conference, CRYPTO 2002 - Santa Barbara, United States
Duration: 18 Aug 200222 Aug 2002

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2442
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference22nd Annual International Cryptology Conference, CRYPTO 2002
Country/TerritoryUnited States
CitySanta Barbara
Period18/08/0222/08/02

Keywords

  • Lower bounds
  • Round complexity
  • Secure multiparty computation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'On 2-round secure multiparty computation'. Together they form a unique fingerprint.

Cite this