Must the Communication Graph of MPC Protocols be an Expander?
نویسندگان
چکیده
Secure multiparty computation (MPC) on incomplete communication networks has been studied within two primary models: (1) Where a partial network is fixed priori, and thus corruptions can occur dependent its structure, (2) edges in the graph are determined dynamically as part of protocol. Whereas rich literature succeeded mapping out feasibility limitations structures supporting secure fixed-graph model (including strong classical lower bounds), these bounds do not apply latter dynamic-graph setting, which recently seen exciting new results, but remains relatively unexplored. In this work, we initiate similar foundational study MPC model. As first step, investigate property expansion. All existing protocols (implicitly or explicitly) yield graphs expanders, it clear whether inherent. Our results consist types (for constant fraction corruptions): * Upper bounds: We demonstrate whose induced expander graphs, wide range settings (computational, information theoretic, with low locality, even locality adaptive security), each assuming some form input-independent setup. Lower plain (no setup) corruptions, that for certain functionalities, no protocol maintain non-expanding against all adversarial strategies. bound relies only correctness (not privacy), requires surprisingly delicate argument. More generally, provide formal framework analyzing evolving protocols, giving starting point studying relation between further, more general properties.
منابع مشابه
Splitting an Expander Graph
Let G V E be an r regular expander graph Certain algorithms for nding edge disjoint paths require the edges of G to be partitioned into E E E Ek so that the graphs Gi V Ei are each expanders In this paper we give a non constructive proof of a very good split plus an algorithm which improves on that given in Broder Frieze and Upfal Existence and construction of edge disjoint paths on expander gr...
متن کاملHow unproportional must a graph be?
Let uk(G, p) be the maximum over all k-vertex graphs F of by how much the number of induced copies of F in G differs from its expectation in the Erdős-Rényi random graph with edge probability p. This may be viewed as a measure of how close G is to being p-quasirandom. Our main result is that, for fixed k ≥ 4 and 0 < p < 1, the minimum of uk(G, p) over n-vertex graphs has order of magnitude Θ(n ...
متن کاملHow complicated must an optical component be?
We analyze how complicated a linear optical component has to be if it is to perform one of a range of functions. Specifically, we devise an approach to evaluating the number of real parameters that must be specified in the device design or fabrication, based on the singular value decomposition of the linear operator that describes the device. This approach can be used for essentially any linear...
متن کاملThere Must be an Acetogen Somewhere
In the beginning of 1983, when I was a post-doctoral student at the University of Illinois, Ralph Wolfe handed me an offprint of a long article and said: “Read this!” That paper was the review by Thauer et al. (1977) on “Energy conservation in chemotrophic anaerobic bacteria.” I have read it many times. I remember that the first and second time I understood very little. During the third and fou...
متن کاملHow large must an iridotomy be?
Four cases of acute angle closure glaucoma in eyes with a small but patent Nd-YAG laser iridotomy are presented, and similar cases in the literature are reviewed. Theoretically a 15 microns diameter iridotomy should be large enough to prevent angle closure glaucoma due to pupil block. Mechanisms by which larger iridotomies fail to prevent angle closure glaucoma, and the role of provocation test...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2023
ISSN: ['0933-2790', '1432-1378']
DOI: https://doi.org/10.1007/s00145-023-09460-8