Chapter

Advances in Cryptology - ASIACRYPT 2013

Volume 8270 of the series Lecture Notes in Computer Science pp 221-240

Between a Rock and a Hard Place: Interpolating between MPC and FHE

  • Ashish ChoudhuryAffiliated withDept. Computer Science, University of Bristol
  • , Jake LoftusAffiliated withDept. Computer Science, University of Bristol
  • , Emmanuela OrsiniAffiliated withDept. Computer Science, University of Bristol
  • , Arpita PatraAffiliated withDept. Computer Science, University of Bristol
  • , Nigel P. SmartAffiliated withDept. Computer Science, University of Bristol

* Final gross prices may vary according to local VAT.

Get Access

Abstract

We present a computationally secure MPC protocol for threshold adversaries which is parametrized by a value L. When L = 2 we obtain a classical form of MPC protocol in which interaction is required for multiplications, as L increases interaction is reduced, in that one requires interaction only after computing a higher degree function. When L approaches infinity one obtains the FHE based protocol of Gentry, which requires no interaction. Thus one can trade communication for computation in a simple way. Our protocol is based on an interactive protocol for “bootstrapping” a somewhat homomorphic encryption (SHE) scheme. The key contribution is that our presented protocol is highly communication efficient enabling us to obtain reduced communication when compared to traditional MPC protocols for relatively small values of L.