Abstract
Consider the task of secure multiparty computation (MPC) among n parties with perfect security and guaranteed output delivery, supporting \(t<n/3\) active corruptions. Suppose the arithmetic circuit C to be computed is defined over a finite ring \(\mathbb {Z}/q\mathbb {Z}\), for an arbitrary \(q\in \mathbb {Z}\). It is known that this type of MPC over such ring is possible, with communication that scales as O(n|C|), assuming that q scales as \(\varOmega (n)\). However, for constant-size rings \(\mathbb {Z}/q\mathbb {Z}\) where \(q = O(1)\), the communication is actually \(O(n\log n|C|)\) due to the need of the so-called ring extensions. In most natural settings, the number of parties is variable but the “datatypes” used for the computation are fixed (e.g. 64-bit integers). In this regime, no protocol with linear communication exists.
In this work we provide an MPC protocol in this setting: perfect security, G.O.D. and \(t<n/3\) active corruptions, that enjoys linear communication O(n|C|), even for constant-size rings \(\mathbb {Z}/q\mathbb {Z}\). This includes as important particular cases small fields such as \(\mathbb {F}_2\), and also the ring \(\mathbb {Z}/2^k\mathbb {Z}\). The main difficulty in achieving this result is that widely used techniques such as linear secret-sharing cannot work over constant-size rings, and instead, one must make use of ring extensions that add \(\varOmega (\log n)\) overhead, while packing \(\varOmega (\log n)\) ring elements in each extension element in order to amortize this cost. We make use of reverse multiplication-friendly embeddings (RMFEs) for this packing, and adapt recent techniques in network routing (Goyal et al. CRYPTO’22) to ensure this can be efficiently used for non-SIMD circuits. Unfortunately, doing this naively results in a restriction on the minimum width of the circuit, which leads to an extra additive term in communication of \(\textsf{poly}(n)\cdot \textsf{depth}(C)\). One of our biggest technical contributions lies in designing novel techniques to overcome this limitation by packing elements that are distributed across different layers. To the best of our knowledge, all works that have a notion of packing (e.g. RMFE or packed secret-sharing) group gates across the same layer, and not doing so, as in our work, leads to a unique set of challenges and complications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
As shown in [GLS19], certain care is needed to ensure that security is not broken by delaying verification. We omit these details in this overview.
- 2.
We assume each client has \(\varOmega (\ell ) = \varOmega (n)\) inputs. Otherwise there is a minor overhead due to packing, but this is only restricted to the input layer.
- 3.
Since we consider constant-sized rings, this is asymptotically the same as measuring the number of ring elements.
- 4.
If this is not the case, we ask the functionality to send the active honest parties’ inputs to the adversary and allow the adversary to decide the output of active honest parties. Essentially, we give up the security if the shares of active honest parties do not lie on degree-d polynomials.
References
Mark Abspoel, Ronald Cramer, Ivan Damgård, Daniel Escudero, and Chen Yuan. Efficient information-theoretic secure multiparty computation over \(\mathbb{Z} /p^k\mathbb{Z}\) via galois rings. In Dennis Hofheinz and Alon Rosen, editors, TCC 2019: 17th Theory of Cryptography Conference, Part I, volume 11891 of Lecture Notes in Computer Science, pages 471–501, Nuremberg, Germany, December 1–5, 2019. Springer, Heidelberg, Germany.
Mark Abspoel, Ronald Cramer, Daniel Escudero, Ivan Damgård, and Chaoping Xing.Improved single-round secure multiplication using regenerating codes.In Mehdi Tibouchi and Huaxiong Wang, editors, Advances in Cryptology – ASIACRYPT 2021, Part II, volume 13091 of Lecture Notes in Computer Science, pages 222–244, Singapore, December 6–10, 2021. Springer, Heidelberg, Germany.
Eli Ben-Sasson, Serge Fehr, and Rafail Ostrovsky. Near-linear unconditionally-secure multiparty computation with a dishonest minority.In Reihaneh Safavi-Naini and Ran Canetti, editors, Advances in Cryptology – CRYPTO 2012, volume 7417 of Lecture Notes in Computer Science, pages 663–680, Santa Barbara, CA, USA, August 19–23, 2012. Springer, Heidelberg, Germany.
Michael Ben-Or, Shafi Goldwasser, and Avi Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, STOC ’88, page 1–10, New York, NY, USA, 1988. Association for Computing Machinery.
Zuzana Beerliová-Trubíniová and Martin Hirt. Perfectly-secure MPC with linear communication complexity. In Ran Canetti, editor, TCC 2008: 5th Theory of Cryptography Conference, volume 4948 of Lecture Notes in Computer Science, pages 213–230, San Francisco, CA, USA, March 19–21, 2008. Springer, Heidelberg, Germany.
Ran Canetti. Security and composition of multiparty cryptographic protocols.Journal of Cryptology, 13(1):143–202, January 2000.
Ignacio Cascudo, Ronald Cramer, Chaoping Xing, and Chen Yuan. Amortized complexity of information-theoretically secure MPC revisited.In Hovav Shacham and Alexandra Boldyreva, editors, Advances in Cryptology – CRYPTO 2018, Part III, volume 10993 of Lecture Notes in Computer Science, pages 395–426, Santa Barbara, CA, USA, August 19–23, 2018. Springer, Heidelberg, Germany.
Ronald Cramer, Matthieu Rambaud, and Chaoping Xing. Asymptotically-good arithmetic secret sharing over \(\mathbb{Z} /p^{\ell }\mathbb{Z}\) with strong multiplication and its applications to efficient MPC. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology – CRYPTO 2021, Part III, volume 12827 of Lecture Notes in Computer Science, pages 656–686, Virtual Event, August 16–20, 2021. Springer, Heidelberg, Germany.
Ivan Damgård, Daniel Escudero, Tore Kasper Frederiksen, Marcel Keller, Peter Scholl, and Nikolaj Volgushev. New primitives for actively-secure MPC over rings with applications to private machine learning. In 2019 IEEE Symposium on Security and Privacy, pages 1102–1120, San Francisco, CA, USA, May 19–23, 2019. IEEE Computer Society Press.
Ivan Damgård, Yuval Ishai, and Mikkel Krøigaard. Perfectly secure multiparty computation and the computational overhead of cryptography.In Henri Gilbert, editor, Advances in Cryptology – EUROCRYPT 2010, volume 6110 of Lecture Notes in Computer Science, pages 445–465, French Riviera, May 30 – June 3, 2010. Springer, Heidelberg, Germany.
Ivan Damgård and Jesper Buus Nielsen. Scalable and unconditionally secure multiparty computation. In Alfred Menezes, editor, Advances in Cryptology – CRYPTO 2007, volume 4622 of Lecture Notes in Computer Science, pages 572–590, Santa Barbara, CA, USA, August 19–23, 2007. Springer, Heidelberg, Germany.
Daniel Escudero, Hongqing Liu, Chaoping Xing, and Chen Yuan. Degree-\( d \) reverse multiplication-friendly embeddings: Constructions and applications. Asiacrypt, 2023.
Thibauld Feneuil and Matthieu Rivain. Threshold linear secret sharing to the rescue of MPC-in-the-head. Cryptology ePrint Archive, Report 2022/1407, 2022. https://eprint.iacr.org/2022/1407.
Vipul Goyal, Yanyi Liu, and Yifan Song. Communication-efficient unconditional MPC with guaranteed output delivery.In Alexandra Boldyreva and Daniele Micciancio, editors, Advances in Cryptology – CRYPTO 2019, Part II, volume 11693 of Lecture Notes in Computer Science, pages 85–114, Santa Barbara, CA, USA, August 18–22, 2019. Springer, Heidelberg, Germany.
Vipul Goyal, Antigoni Polychroniadou, and Yifan Song. Unconditional communication-efficient MPC via hall’s marriage theorem. In Tal Malkin and Chris Peikert, editors, Advances in Cryptology – CRYPTO 2021, Part II, volume 12826 of Lecture Notes in Computer Science, pages 275–304, Virtual Event, August 16–20, 2021. Springer, Heidelberg, Germany.
Vipul Goyal, Antigoni Polychroniadou, and Yifan Song. Sharing transformation and dishonest majority MPC with packed secret sharing. In Yevgeniy Dodis and Thomas Shrimpton, editors, Advances in Cryptology – CRYPTO 2022, Part IV, volume 13510 of Lecture Notes in Computer Science, pages 3–32, Santa Barbara, CA, USA, August 15–18, 2022. Springer, Heidelberg, Germany.
Vipul Goyal, Yifan Song, and Chenzhi Zhu. Guaranteed output delivery comes free in honest majority MPC. In Daniele Micciancio and Thomas Ristenpart, editors, Advances in Cryptology – CRYPTO 2020, Part II, volume 12171 of Lecture Notes in Computer Science, pages 618–646, Santa Barbara, CA, USA, August 17–21, 2020. Springer, Heidelberg, Germany.
Martin Hirt, Ueli M. Maurer, and Bartosz Przydatek. Efficient secure multi-party computation. In Tatsuaki Okamoto, editor, Advances in Cryptology – ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 143–161, Kyoto, Japan, December 3–7, 2000. Springer, Heidelberg, Germany.
Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, and Ching-Hua Yu. Secure protocol transformations.In Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology – CRYPTO 2016, Part II, volume 9815 of Lecture Notes in Computer Science, pages 430–458, Santa Barbara, CA, USA, August 14–18, 2016. Springer, Heidelberg, Germany.
Antigoni Polychroniadou and Yifan Song. Constant-overhead unconditionally secure multiparty computation over binary fields. In Anne Canteaut and François-Xavier Standaert, editors, Advances in Cryptology – EUROCRYPT 2021, Part II, volume 12697 of Lecture Notes in Computer Science, pages 812–841, Zagreb, Croatia, October 17–21, 2021. Springer, Heidelberg, Germany.
Adi Shamir. How to share a secret. Communications of the Association for Computing Machinery, 22(11):612–613, November 1979.
Zhe-Xian Wan. Lectures on finite fields and Galois rings. World Scientific Publishing Company, 2003.
Acknowledgments
This paper was prepared in part for information purposes by the Artificial Intelligence Research group of JPMorgan Chase & Co and its affiliates (“JP Morgan”), and is not a product of the Research Department of JP Morgan. JP Morgan makes no representation and warranty whatsoever and disclaims all liability, for the completeness, accuracy or reliability of the information contained herein. This document is not intended as investment research or investment advice, or a recommendation, offer or solicitation for the purchase or sale of any security, financial instrument, financial product or service, or to be used in any way for evaluating the merits of participating in any transaction, and shall not constitute a solicitation under any jurisdiction or to any person, if such solicitation under such jurisdiction or to such person would be unlawful. 2024 JP Morgan Chase & Co. All rights reserved.
Y. Song was supported in part by the National Basic Research Program of China Grant 2011CBA00300, 2011CBA00301, the National Natural Science Foundation of China Grant 61033001, 61361136003.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 International Association for Cryptologic Research
About this paper
Cite this paper
Escudero, D., Song, Y., Wang, W. (2025). Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15489. Springer, Singapore. https://doi.org/10.1007/978-981-96-0938-3_4
Download citation
DOI: https://doi.org/10.1007/978-981-96-0938-3_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-96-0937-6
Online ISBN: 978-981-96-0938-3
eBook Packages: Computer ScienceComputer Science (R0)