International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Secure Multiparty Computation with Identifiable Abort from Vindicating Release

Authors:
Ran Cohen , Reichman University
Jack Doerner , Brown University, Technion, Reichman University
Yashvanth Kondi , Silence Labs (Deel)
abhi shelat , Northeastern University
Download:
DOI: 10.1007/978-3-031-68397-8_2 (login may be required)
Search ePrint
Search Google
Conference: CRYPTO 2024
Abstract: In the dishonest-majority setting, secure multiparty computation (MPC) with identifiable abort (IA) guarantees that honest parties can identify and agree upon at least one cheating party if the protocol does not produce an output. Known MPC constructions with IA rely on generic zero-knowledge proofs, adaptively secure oblivious transfer (OT) protocols, or homomorphic primitives, and thus incur a substantial penalty with respect to protocols that abort without identifiability. We introduce a new, weaker notion of IA called input-revealing IA (IRIA), which can be constructed through selective revealing of committed input values---a technique we call vindicating release. We show that this weaker form of IA can be achieved with small concrete overheads for many interesting protocols in the literature, including the pre-processing protocols needed for several state-of-the-art MPC protocols. We next show how to assemble these IRIA components into an MPC protocol for any functionality with standard IA. Such a realization differs minimally in terms of cost, techniques, and analysis from the equivalent realization that lacks identifiability, e.g., our total bandwidth overhead incurred is less than 2x, which is an asymptotic improvement over prior work on IA. On a practical level, we apply our techniques to the problem of threshold ECDSA, and show that the resulting protocol with standard IA is concretely efficient. On a theoretical level, we present a compiler that transforms any secure protocol into one with standard IA assuming only a variant of statically-corruptable ideal OT.
BibTeX
@inproceedings{crypto-2024-34349,
  title={Secure Multiparty Computation with Identifiable Abort from Vindicating Release},
  publisher={Springer-Verlag},
  doi={10.1007/978-3-031-68397-8_2},
  author={Ran Cohen and Jack Doerner and Yashvanth Kondi and abhi shelat},
  year=2024
}