Information Security and Cryptography Research Group

Perfect MPC over Layered Graphs

Bernardo David, Giovanni Deligios, Aarushi Goel, Yuval Ishai, Anders Konring, Eyal Kushileviz, Chen-Da Liu-Zhang, and Varun Narayanan

Advances in Cryptology—CRYPTO 2023, LNCS, Springer Nature Switzerland, vol. 14081, pp. 360–392, Aug 2023.

The classical “BGW protocol” (Ben-Or, Goldwasser, and Wigderson, STOC 1988) shows that secure multiparty computation (MPC) among n parties can be realized with perfect full security if 𝑡<𝑛/3 parties are corrupted. This holds against malicious adversaries in the “standard” model for MPC, where a fixed set of n parties is involved in the full execution of the protocol. However, the picture is less clear in the mobile adversary setting of Ostrovsky and Yung (PODC 1991), where the adversary may periodically “move” by uncorrupting parties and corrupting a new set of t parties. In this setting, it is unclear if full security can be achieved against an adversary that is maximally mobile, i.e., moves after every round. The question is further motivated by the “You Only Speak Once” (YOSO) setting of Gentry et al. (Crypto 2021), where not only the adversary is mobile but also each round is executed by a disjoint set of parties. Previous positive results in this model do not achieve perfect security, and either assume probabilistic corruption and a nonstandard communication model, or only realize the weaker goal of security-with-abort. The question of matching the BGW result in these settings remained open.

In this work, we tackle the above two challenges simultaneously. We consider a layered MPC model, a simplified variant of the fluid MPC model of Choudhuri et al. (Crypto 2021). Layered MPC is an instance of standard MPC where the interaction pattern is defined by a layered graph of width n, allowing each party to send secret messages and broadcast messages only to parties in the next layer. We require perfect security against a malicious adversary who may corrupt at most t parties in each layer. Our main result is a perfect, fully secure layered MPC protocol with an optimal corruption threshold of 𝑡<𝑛/3, thus extending the BGW feasibility result to the layered setting. This implies perfectly secure MPC protocols against a maximally mobile adversary.

BibTeX Citation

    author       = {Bernardo David and Giovanni Deligios and Aarushi Goel and Yuval Ishai and Anders Konring and Eyal Kushileviz and Chen-Da Liu-Zhang and Varun Narayanan},
    title        = {Perfect MPC over Layered Graphs},
    editor       = {Helena Handschuh, Anna Lysyanskaya},
    booktitle    = {Advances in Cryptology—CRYPTO 2023},
    pages        = {360--392},
    series       = {LNCS},
    volume       = {14081},
    year         = {2023},
    month        = {8},
    address      = {Cham},
    publisher    = {Springer Nature Switzerland},

Files and Links