Paper 2026/257
Dishonest-Majority Secure Computation via PIR-Authenticated Multiplication Triples
Abstract
We revisit the question of minimizing the overhead of security against malicious parties in dishonest-majority secure computation. A leading approach, pioneered by the SPDZ line of protocols, uses homomorphic MACs to authenticate computation: Parties effectively compute a MAC on the computation output using authenticated multiplication triples (AMT). However, securely generating these AMTs presently sits as the cost bottleneck. In this work, we introduce a new technique for enabling SPDZ-style verification via homomorphic MACs, while bypassing the need for AMT. We instead rely on the specific structure of state-of-the-art fast pseudorandom correlation generators (PCG) for generating standard (unauthenticated) multiplication triples (MT). Parties authenticate the computation result via an authenticated variant of private information retrieval (PIR), relying on the sparse representation of MT produced by these PCGs. This opens the door to a wide range of PIR optimizations and tradeoffs from the literature, resulting in asymptotic and concrete improvements over the traditional AMT-based approach. For example, in the Boolean 2-party case with \(\sigma=40\), we get a \(3\times\) to \(8\times\) computation improvement (and comparable communication) over best approaches using PCG to generate AMT, where the latter exploits variants of the Stationary Syndrome Decoding assumption of Kolesnikov et al. (Crypto 2025). With \(m\ge 3\) parties we obtain even larger improvements while reducing the asymptotic dependence on \(m\) from cubic to quadratic.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- multi-party computationprivate information retrieval
- Contact author(s)
-
eboyle @ alum mit edu
niv gilboa @ gmail com
matan hamilis @ gmail com
yuvali @ cs technion ac il
nofdinar @ gmail com - History
- 2026-02-16: approved
- 2026-02-13: received
- See all versions
- Short URL
- https://ia.cr/2026/257
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2026/257,
author = {Elette Boyle and Niv Gilboa and Matan Hamilis and Yuval Ishai and Ariel Nof},
title = {Dishonest-Majority Secure Computation via {PIR}-Authenticated Multiplication Triples},
howpublished = {Cryptology {ePrint} Archive, Paper 2026/257},
year = {2026},
url = {https://eprint.iacr.org/2026/257}
}