Broadcast-Optimal Secure Computation from Black-Box Oblivious Transfer

Authors
  • Michele Ciampi
  • Divya Ravi ORCID logo
  • Luisa Siniscalchi
  • Yu Xia
Publication date 2026
Host editors
  • G. Hanaoka
  • B.-Y. Yang
Book title Advances in Cryptology - ASIACRYPT 2025
Book subtitle 31st International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, VIC, Australia, December 8–12, 2025 : proceedings
ISBN
  • 9789819551156
ISBN (electronic)
  • 9789819551163
Series Lecture Notes in Computer Science
Event 31st Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025
Volume | Issue number V
Pages (from-to) 133-162
Publisher Singapore: Springer
Organisations
  • Faculty of Science (FNWI) - Informatics Institute (IVI)
Abstract
When investigating the round-complexity of multi-party computation protocols (MPC) protocols, it is common to assume that in each round parties can communicate over broadcast channels. However, broadcast is an expensive resource, and as such its use should be minimized. For this reason, Cohen, Garay, and Zikas (Eurocrypt 2020) investigated the tradeoffs between the use of broadcast in two-round protocols assuming setup and the achievable security guarantees. Despite the prolific line of research that followed the results of Cohen, Garay, and Zikas, none of the existing results considered the problem of minimizing the use of broadcast while relying in a black-box way on the underlying cryptographic primitives. In this work, we fully characterize the necessary and sufficient requirements in terms of broadcast usage in the dishonest majority setting for round-optimal MPC with black-box use of minimal cryptographic assumptions. Our main result shows that to securely realize any functionality with unanimous abort in the common reference string model with black-box use of two-round oblivious transfer it is necessary and sufficient for the parties to adhere to the following pattern: in the first two rounds the parties exchange messages over peer-to-peer channels, and in the last round the messages are sent over a broadcast channel. We also extend our results to the correlated randomness setting where we prove that one round of peer-to-peer interaction and one round of broadcast is optimal to evaluate any functionality with unanimous abort.
Document type Conference contribution
Language English
Published at https://doi.org/10.1007/978-981-95-5116-3_5
Other links https://www.scopus.com/pages/publications/105025363523
Permalink to this page
Back