Multiparty Computation from Somewhat Homomorphic Encryption

  • Ivan Damgård
  • Valerio Pastro
  • Nigel Smart
  • Sarah Zakarias
Conference paper

DOI: 10.1007/978-3-642-32009-5_38

Volume 7417 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Damgård I., Pastro V., Smart N., Zakarias S. (2012) Multiparty Computation from Somewhat Homomorphic Encryption. In: Safavi-Naini R., Canetti R. (eds) Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science, vol 7417. Springer, Berlin, Heidelberg

Abstract

We propose a general multiparty computation protocol secure against an active adversary corrupting up to \(n-1\) of the n players. The protocol may be used to compute securely arithmetic circuits over any finite field \(\mathbb {F}_{p^k}\). Our protocol consists of a preprocessing phase that is both independent of the function to be computed and of the inputs, and a much more efficient online phase where the actual computation takes place. The online phase is unconditionally secure and has total computational (and communication) complexity linear in n, the number of players, where earlier work was quadratic in n. Moreover, the work done by each player is only a small constant factor larger than what one would need to compute the circuit in the clear. We show this is optimal for computation in large fields. In practice, for 3 players, a secure 64-bit multiplication can be done in 0.05 ms. Our preprocessing is based on a somewhat homomorphic cryptosystem. We extend a scheme by Brakerski et al., so that we can perform distributed decryption and handle many values in parallel in one ciphertext. The computational complexity of our preprocessing phase is dominated by the public-key operations, we need \(O(n^2/s)\) operations per secure multiplication where s is a parameter that increases with the security parameter of the cryptosystem. Earlier work in this model needed \(\varOmega (n^2)\) operations. In practice, the preprocessing prepares a secure 64-bit multiplication for 3 players in about 13 ms.

Download to read the full conference paper text

Copyright information

© International Association for Cryptologic Research 2012 2012

Authors and Affiliations

  • Ivan Damgård
    • 1
  • Valerio Pastro
    • 1
  • Nigel Smart
    • 2
  • Sarah Zakarias
    • 1
  1. 1.Department of Computer ScienceAarhus UniversityAarhusDenmark
  2. 2.Department of Computer ScienceBristol UniversityBristolEngland