Lower bounds for Unconditionally Secure MPC

 
Lower bounds for
Unconditionally Secure MPC
 
Ivan Damgård
Jesper Buus Nielsen
Antigoni Polychroniadou
Aarhus University.
Unconditionally Secure MPC
Protocols (GMW, SPDZ,..)
 
They are great:
Computationally much more                    efficient
than, say, FHE based stuff.
But they’re not so great:
They need lots of interaction
Rounds: Ω(CircuitDepth)
Communication: 
Ω
(n CircuitSize)
- If you want to be efficient in the circuit size
The Really Hard Problem
 
Can we improve this significantly?
                    The FHE of
                    unconditional security?
 
 
We don’t know, but we have
some partial answers..
Message Complexity
 
How many
 messages
 do you need to send to
compute a non-trivial function securely? (such as
the AND of one bit from each player).
Related to, but not the same as round complexity.
If protocol sometimes but not always sends a
message in  given time slot, should we always
charge for that time slot? (the absence of a
message is also a signal).
We will only charge the protocol for messages
actually sent (lower bounds are stronger this way).
 
The Result
 
n players, t semi-honest corruptions: must send Ω(nt)
messages (stay tuned for more precise version)
In particular, n=3, t=1, compute the AND of 3 input bits:
6 messages are necessary.
Also sufficient (based on PSM [IK97]).
Intuition for lower bound
 
Any player must communicate with at least t+1 players
before his input becomes determined.
.. and must later receive another message to be able to
compute the result.
So for each player we count (t+1)+2 sends or receives,
hence at least n(t+3)/2 messages.
Can be formalized, resulting in almost this:
ceiling(n(t+3)-1)/2)
This is exactly tight for t=1 and functions in det. log-
space (positive result based on PSM).
What about number of rounds?
 
Seems hard in general, but let’s see if 
some of 
the
players can be 
lazy
: get away with only 1 round.
n=3t+1 players, t malicious corruptions. Can
construct general protocol where up to t players
can be lazy.
At most t players can be lazy.
Similar result for semi-honest
- follows from message
complexity bound.
Gate by Gate Protocols
 
Bounding communication and rounds needed in
general seems hard. But maybe we can bound it for
the 
gate-by-gate protocols 
we use all the time.
Known protocols: in the worst case, communication is
Ω(n CircuitSize), rounds Ω(CircuitDepth).
Question: is this optimal for gate-by-gate protocols
(both honest majority and dishonest majority with
preprocessing)?
Warm-up: Honest Majority
 
A 
gate-by-gate protocol 
is one that handles a multiplication
gate using a 
multiplication gate protocol: 
takes two sets of
shares (of a and b in some field), returns shares of ab –
perhaps in different secret sharing scheme, but 
same
threshold
 t as for inputs.
Further, revealing the output shares reveals nothing more
than ab.
Claim: any multiplication gate protocol must send at least t
messages.
If not, 2-party unconditionally secure protocol for
computing the product would follow..
 
A
l
i
c
e
   a
 
B
o
b
  b
 
Shares of input
 
Shares of ab
And so..
 
Any gate-by-gate protocol must (for a worst case
circuit) have 
communication Ω(n CircuitSize), rounds
Ω(CircuitDepth).
But what if circuit is nice and allows many
multiplications in parallel? We know optimizations
using packed secret sharing..
..but only if number of players grows with number of
parallel multiplications.
OPEN: for a 
constant
 number of players, show that
multiplication gate protocol for u multiplications must
have communication Ω(u).
Solution for computational
complexity
 
Say n=2t+1, passive security. Assume mult.gate prot.
that does u mults where some player P does o(u) local
mults.
Construct 2-party protocol for the preprocessing
model: Alice emulates t players, Bob emulates another
t, and we emulate P using preprocessed data and e.g.
SPDZ. Can compute u products securely using o(u)
preprocessed data.
Contradiction with lower bounds by [Winkler and
Wullschleger, Crypto 11]. Generalizes to show that
packed SS methods are optimal up to constant factor.
Dishonest Majority, Preprocessing
 
Previous argument that multiplication protocols need
to communicate a lot breaks down.
But we have lower bounds on the amount of
preprocessed data (e.g. Winkler and Wullschleger).
Can obtain same result as before: we show that a
multiplication gate protocol that does not
communicate enough implies a protocol that is too
good to be true according to W&W.
Conclusion
 
Even with preprocessing, gate-by-gate protocols require
Ω(n CircuitSize) 
communication (and hence work) and
Ω(CircuitDepth) rounds
So to really improve GMW, SPDZ, TinyOT and the like,
need a fundamentally different approach.
Open: do these bounds hold for any protocol (with
unconditional security and efficient in circuit size of
function)?
- Computation – I conjecture yes
- Communication - ??
 
Thanks!
Postdoc and PhD positions for studying
theory and practice of MPC available in
Aarhus (supported by ERC grant
MPCPRO) – from October 1.
Slide Note
Embed
Share

Unconditionally secure MPC protocols like GMW and SPDZ are efficient but require significant interaction rounds. The challenge is to improve efficiency while maintaining security. Message complexity and round complexity play a crucial role in achieving this goal. Lower bounds help in understanding the minimum communication needed for secure computation.

  • Secure MPC
  • GMW
  • SPDZ
  • Message complexity
  • Efficiency

Uploaded on Feb 16, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Lower bounds for Unconditionally Secure MPC Ivan Damg rd Jesper Buus Nielsen Antigoni Polychroniadou Aarhus University.

  2. Unconditionally Secure MPC Protocols (GMW, SPDZ,..) They are great: Computationally much more efficient than, say, FHE based stuff. But they re not so great: They need lots of interaction Rounds: (CircuitDepth) Communication: (n CircuitSize) - If you want to be efficient in the circuit size

  3. The Really Hard Problem Can we improve this significantly? The FHE of unconditional security? We don t know, but we have some partial answers..

  4. Message Complexity How many messages do you need to send to compute a non-trivial function securely? (such as the AND of one bit from each player). Related to, but not the same as round complexity. If protocol sometimes but not always sends a message in given time slot, should we always charge for that time slot? (the absence of a message is also a signal). We will only charge the protocol for messages actually sent (lower bounds are stronger this way).

  5. The Result n players, t semi-honest corruptions: must send (nt) messages (stay tuned for more precise version) In particular, n=3, t=1, compute the AND of 3 input bits: 6 messages are necessary. Also sufficient (based on PSM [IK97]).

  6. Intuition for lower bound Any player must communicate with at least t+1 players before his input becomes determined. .. and must later receive another message to be able to compute the result. So for each player we count (t+1)+2 sends or receives, hence at least n(t+3)/2 messages. Can be formalized, resulting in almost this: ceiling(n(t+3)-1)/2) This is exactly tight for t=1 and functions in det. log- space (positive result based on PSM).

  7. What about number of rounds? Seems hard in general, but let s see if some of the players can be lazy: get away with only 1 round. n=3t+1 players, t malicious corruptions. Can construct general protocol where up to t players can be lazy. At most t players can be lazy. Similar result for semi-honest - follows from message complexity bound.

  8. Gate by Gate Protocols Bounding communication and rounds needed in general seems hard. But maybe we can bound it for the gate-by-gate protocols we use all the time. Known protocols: in the worst case, communication is (n CircuitSize), rounds (CircuitDepth). Question: is this optimal for gate-by-gate protocols (both honest majority and dishonest majority with preprocessing)?

  9. Warm-up: Honest Majority A gate-by-gate protocol is one that handles a multiplication gate using a multiplication gate protocol: takes two sets of shares (of a and b in some field), returns shares of ab perhaps in different secret sharing scheme, but same threshold t as for inputs. Further, revealing the output shares reveals nothing more than ab. Claim: any multiplication gate protocol must send at least t messages. If not, 2-party unconditionally secure protocol for computing the product would follow..

  10. Alice a Bob b Shares of input Shares of ab

  11. And so.. Any gate-by-gate protocol must (for a worst case circuit) have communication (n CircuitSize), rounds (CircuitDepth). But what if circuit is nice and allows many multiplications in parallel? We know optimizations using packed secret sharing.. ..but only if number of players grows with number of parallel multiplications. OPEN: for a constant number of players, show that multiplication gate protocol for u multiplications must have communication (u).

  12. Solution for computational complexity Say n=2t+1, passive security. Assume mult.gate prot. that does u mults where some player P does o(u) local mults. Construct 2-party protocol for the preprocessing model: Alice emulates t players, Bob emulates another t, and we emulate P using preprocessed data and e.g. SPDZ. Can compute u products securely using o(u) preprocessed data. Contradiction with lower bounds by [Winkler and Wullschleger, Crypto 11]. Generalizes to show that packed SS methods are optimal up to constant factor.

  13. Dishonest Majority, Preprocessing Previous argument that multiplication protocols need to communicate a lot breaks down. But we have lower bounds on the amount of preprocessed data (e.g. Winkler and Wullschleger). Can obtain same result as before: we show that a multiplication gate protocol that does not communicate enough implies a protocol that is too good to be true according to W&W.

  14. Conclusion Even with preprocessing, gate-by-gate protocols require (n CircuitSize) communication (and hence work) and (CircuitDepth) rounds So to really improve GMW, SPDZ, TinyOT and the like, need a fundamentally different approach. Open: do these bounds hold for any protocol (with unconditional security and efficient in circuit size of function)? - Computation I conjecture yes - Communication - ??

  15. Postdoc and PhD positions for studying theory and practice of MPC available in Aarhus (supported by ERC grant MPCPRO) from October 1. Thanks!

More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#