On the theoretical gap between synchronous and asynchronous MPC protocols
Author(s) -
Zuzana Beerliová-Trubíniová,
Martin Hirt,
Jesper Buus Nielsen
Publication year - 2010
Publication title -
citeseer x (the pennsylvania state university)
Language(s) - English
Resource type - Conference proceedings
DOI - 10.1145/1835698.1835746
Subject(s) - asynchronous communication , computer science , computer network
Multiparty computation (MPC) protocols among n parties secure against t active faults are known to exist if and only if t n/2, when the channels are synchronous, and t n/3, when the channels are asynchronous, respectively. In this work we analyze the gap between these bounds, and show that in the cryptographic setting (with setup), the sole reason for it is the distribution of inputs: given an oracle for input distribution, cryptographically-secure asynchronous MPC is possible with the very same condition as synchronous MPC, namely t n/2. We do not know whether the gaps in other security models (perfect, statistical) have the same cause. We stress that all previous asynchronous MPC protocols inherently require t n/3, even once inputs are distributed. In particular, all published asynchronous multiplication sub-protocols inherently require t n/3 and cannot be used in our setting. Furthermore, we show that such an input-distribution oracle can be reduced to an oracle that allows each party to synchronously broadcast one single message. This means that when one single round of synchronous broadcast is available, then asynchronous MPC is possible at the same condition as synchronous MPC, namely t n/2. If such a round cannot be used, then MPC (and even Byzantine agreement) requires t n/3.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom