Skip to main navigation Skip to search Skip to main content

Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions

  • Michele Ciampi*
  • , Rafail Ostrovsky
  • , Luisa Siniscalchi
  • , Hendrik Waldner
  • *Corresponding author for this work
  • University of Edinburgh
  • University of California
  • Nethermind

Research output: Chapter in Book/Report/Conference proceedingBook chapterResearchpeer-review

Abstract

A central direction of research in secure multiparty computation with dishonest majority has been to achieve three main goals:
1. reduce the total number of rounds of communication (to four, which is optimal);
2. use only polynomial-time hardness assumptions, and
3. rely solely on cryptographic assumptions in a black-box manner.
This is especially challenging when we do not allow a trusted setup assumption of any kind. While protocols achieving two out of three goals in this setting have been designed in recent literature, achieving all three simultaneously remained an elusive open question. Specifically, it was answered positively only for a restricted class of functionalities. In this paper, we completely resolve this long-standing open question. Specifically, we present a protocol for all polynomial-time computable functions that does not require any trusted setup assumptions and achieves all three of the above goals simultaneously.
Original languageEnglish
Title of host publicationProceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025
Volume15605
PublisherSpringer
Publication date2025
Pages331-359
ISBN (Print)978-3-031-91091-3
ISBN (Electronic)978-3-031-91092-0
DOIs
Publication statusPublished - 2025
EventThe 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques - Madrid, Spain
Duration: 4 May 20258 May 2025

Conference

ConferenceThe 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques
Country/TerritorySpain
CityMadrid
Period04/05/202508/05/2025

Fingerprint

Dive into the research topics of 'Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions'. Together they form a unique fingerprint.

Cite this