Paper 2026/257

Dishonest-Majority Secure Computation via PIR-Authenticated Multiplication Triples

Elette Boyle, NTT Research, Reichman University
Niv Gilboa, Ben-Gurion University of the Negev
Matan Hamilis, Reichman University
Yuval Ishai, Technion – Israel Institute of Technology
Ariel Nof, Bar-Ilan University
Abstract

We revisit the question of minimizing the overhead of security against malicious parties in dishonest-majority secure computation. A leading approach, pioneered by the SPDZ line of protocols, uses homomorphic MACs to authenticate computation: Parties effectively compute a MAC on the computation output using authenticated multiplication triples (AMT). However, securely generating these AMTs presently sits as the cost bottleneck. In this work, we introduce a new technique for enabling SPDZ-style verification via homomorphic MACs, while bypassing the need for AMT. We instead rely on the specific structure of state-of-the-art fast pseudorandom correlation generators (PCG) for generating standard (unauthenticated) multiplication triples (MT). Parties authenticate the computation result via an authenticated variant of private information retrieval (PIR), relying on the sparse representation of MT produced by these PCGs. This opens the door to a wide range of PIR optimizations and tradeoffs from the literature, resulting in asymptotic and concrete improvements over the traditional AMT-based approach. For example, in the Boolean 2-party case with \(\sigma=40\), we get a \(3\times\) to \(8\times\) computation improvement (and comparable communication) over best approaches using PCG to generate AMT, where the latter exploits variants of the Stationary Syndrome Decoding assumption of Kolesnikov et al. (Crypto 2025). With \(m\ge 3\) parties we obtain even larger improvements while reducing the asymptotic dependence on \(m\) from cubic to quadratic.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
multi-party computationprivate information retrieval
Contact author(s)
eboyle @ alum mit edu
niv gilboa @ gmail com
matan hamilis @ gmail com
yuvali @ cs technion ac il
nofdinar @ gmail com
History
2026-02-16: approved
2026-02-13: received
See all versions
Short URL
https://ia.cr/2026/257
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2026/257,
      author = {Elette Boyle and Niv Gilboa and Matan Hamilis and Yuval Ishai and Ariel Nof},
      title = {Dishonest-Majority Secure Computation via {PIR}-Authenticated Multiplication Triples},
      howpublished = {Cryptology {ePrint} Archive, Paper 2026/257},
      year = {2026},
      url = {https://eprint.iacr.org/2026/257}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.