Abstract
A central direction of research in secure multiparty computation with dishonest majority has been to achieve three main goals:
1. reduce the total number of rounds of communication (to four, which is optimal);
2. use only polynomial-time hardness assumptions, and
3. rely solely on cryptographic assumptions in a black-box manner.
This is especially challenging when we do not allow a trusted setup assumption of any kind. While protocols achieving two out of three goals in this setting have been designed in recent literature, achieving all three simultaneously remained an elusive open question. Specifically, it was answered positively only for a restricted class of functionalities. In this paper, we completely resolve this long-standing open question. Specifically, we present a protocol for all polynomial-time computable functions that does not require any trusted setup assumptions and achieves all three of the above goals simultaneously.
1. reduce the total number of rounds of communication (to four, which is optimal);
2. use only polynomial-time hardness assumptions, and
3. rely solely on cryptographic assumptions in a black-box manner.
This is especially challenging when we do not allow a trusted setup assumption of any kind. While protocols achieving two out of three goals in this setting have been designed in recent literature, achieving all three simultaneously remained an elusive open question. Specifically, it was answered positively only for a restricted class of functionalities. In this paper, we completely resolve this long-standing open question. Specifically, we present a protocol for all polynomial-time computable functions that does not require any trusted setup assumptions and achieves all three of the above goals simultaneously.
| Original language | English |
|---|---|
| Title of host publication | Proceedings of the 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2025 |
| Volume | 15605 |
| Publisher | Springer |
| Publication date | 2025 |
| Pages | 331-359 |
| ISBN (Print) | 978-3-031-91091-3 |
| ISBN (Electronic) | 978-3-031-91092-0 |
| DOIs | |
| Publication status | Published - 2025 |
| Event | The 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques - Madrid, Spain Duration: 4 May 2025 → 8 May 2025 |
Conference
| Conference | The 44th Annual International Conference on the Theory and Applications of Cryptographic Techniques |
|---|---|
| Country/Territory | Spain |
| City | Madrid |
| Period | 04/05/2025 → 08/05/2025 |
Fingerprint
Dive into the research topics of 'Round-Optimal Black-Box Multiparty Computation from Polynomial-Time Assumptions'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver