Asynchronous Multiparty Computation: Theory and Implementation

  • Ivan Damgård
  • Martin Geisler
  • Mikkel Krøigaard
  • Jesper Buus Nielsen
Conference paper

DOI: 10.1007/978-3-642-00468-1_10

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5443)
Cite this paper as:
Damgård I., Geisler M., Krøigaard M., Nielsen J.B. (2009) Asynchronous Multiparty Computation: Theory and Implementation. In: Jarecki S., Tsudik G. (eds) Public Key Cryptography – PKC 2009. PKC 2009. Lecture Notes in Computer Science, vol 5443. Springer, Berlin, Heidelberg

Abstract

We propose an asynchronous protocol for general multiparty computation. The protocol has perfect security and communication complexity \(\mathcal{O}(n^2|C|k)\), where n is the number of parties, |C| is the size of the arithmetic circuit being computed, and k is the size of elements in the underlying field. The protocol guarantees termination if the adversary allows a preprocessing phase to terminate, in which no information is released. The communication complexity of this protocol is the same as that of a passively secure solution up to a constant factor. It is secure against an adaptive and active adversary corrupting less than n/3 players. We also present a software framework for implementation of asynchronous protocols called VIFF (Virtual Ideal Functionality Framework), which allows automatic parallelization of primitive operations such as secure multiplications, without having to resort to complicated multithreading. Benchmarking of a VIFF implementation of our protocol confirms that it is applicable to practical non-trivial secure computations.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Ivan Damgård
    • 1
  • Martin Geisler
    • 1
  • Mikkel Krøigaard
    • 1
  • Jesper Buus Nielsen
    • 1
  1. 1.Dept. of Computer ScienceUniversity of AarhusDenmark

Personalised recommendations