Cloud-SMPC: two-round multilinear maps secure multiparty computation based on LWE assumption

Cloud computing has data leakage from all parties, security protection of private data, and existing solutions do not provide a trade-off between security and overhead. With distributed data communication due to data barriers, information interaction security and data computation security have become challenges for secure computing. Combining cloud computing with secure multiparty computation can provide a higher level of data protection while maintaining the benefits of cloud computing. In this case, data can be stored in the cloud and computed through SMPC protocols, thus protecting the privacy and security of the data. However, multiple rounds of information interaction are often required, increasing the communication overhead, and the security strength is limited by the hardness assumption. In this paper, we work to achieve an optimal setting of the number of rounds in secure multi-party computation on the cloud to achieve a sublinear communication overhead and improve the security concept. A 2-round SMPC protocol is constructed in the framework of Universally Composable (UC). A 2-round SMPC protocol is constructed that uses multilinear maps based on the Learning from Errors (LWE) assumption. The participant encodes the input and sends it via broadcast to reduce the interaction, homomorphic computational encoding information for secure access to computational data and secure the SMPC protocol through UC security. This paper extends the participants to multiple parties, reduces the communication rounds to 2, the protocol achieves sublinear communication overhead in poly polynomial time, smaller setup size to poly ( k ), and static security is achieved.


Introduction
Cloud computing has grown considerably in recent years, and the development of computing models that store data and applications on remote servers has matured and become popular.While edge cloud computing [1][2][3][4] enables efficient data processing and transmission, and many applications are also available in the Internet of Things [5,6].Combining deep learning and model training with cloud computing for web personalized recommendation system and anomaly detection [7][8][9][10].But it also poses some security risks [11].As data and computation are dispersed to edge nodes, attackers may exploit weaker security mechanisms to compromise these nodes, leading to problems such as data leakage or service disruption.Therefore, strict security measures, including data encryption, authentication, access control, and vulnerability management, must be adopted in edge cloud computing applications to ensure the security and stability of the system.In the background of big data, data security, communication security [12,13] and secure data sharing, privacy computing have become particularly important.Many researchers have conducted in-depth research and studies in many areas such as data security, privacy protection, and adversary attack and defense [14][15][16][17][18]. From the perspective of cryptography, secure multiparty computation [19] technology provides a reasonable solution.Yao proposed the "millionaire problem" in 1982, leading to the first secure two-party computation protocol [20], which uses the technique of circuits to represent computational functions as boolean circuits and provides computational security for secure two-party computation protocols under a semi-honest model.This was followed by Goldreich et al. who gave the first secure multiparty computation protocol [21] and guaranteed the security of the protocol under a semi-honest model.After decades of development, existing research has focused on the performance of SMPC, mainly on the number of communication rounds, communication complexity, computational complexity, and minimization of complexity assumptions to enhance the concept of security.Abraham et al. [22] construct a protocol based on verifiable secret sharing (VSS) that matches a semi-honest setting with a round complexity that is proportional to the circuit depth.A SMPC protocol against malicious adversaries and without trustworthy assumption settings was proposed [23], setting up a 5-round SMPC protocol based on Decisional Diffie-Hellman (DDH) assumption and a 4-round SMPC protocol constructed by one-way permutations based on sub-exponential security DDH assumption.For the problem of optimizing the number of rounds in a protocol, Ananth et al. [24] study the round complexity of n-party protocols in an honest majority setting to tolerate the corruption of t < n 2 participants and achieve abort security under the plain model where the security of the protocol depends only on the one-way function.
For SMPC, cryptographic techniques such as Laconic Function Evaluation (LFE), oblivious transfer (OT) are used to construct secure multiparty computation protocols [25][26][27] and to reduce the number of rounds of interaction between participants.Existing studies have shown that high communication overhead, high complexity of rounds and low security strength in secure multiparty computation.Therefore, this paper is based on cloud computing to achieve a more secure and efficient secure multiparty computation scheme, the general process is as follows Fig. 1.This paper is devoted to solving the round number complexity optimization problem in SMPC on the cloud by introducing harder security assumptions to improve the security concept, reduce the number of interactions, and achieve low communication overhead for privacy-secure cloud computing.The contributions of this paper are as follows.
1. To optimize the round complexity of the protocol in cloud-based SMPC, we construct a 2-round secure multiparty computation using a multilinear map based on the LWE assumption.2. In this paper the implementation of the protocol is done in the UC framework, the ideal functionality is delivered to the computing on the cloud and each participant can access the ideal functionality, the protocol is finally implemented on the cloud with UC security for SMPC security and increased security strength.
Fig. 1 Secure multiparty computation scheme on the cloud 3. The parameters of the SMPC protocol settings are only related to the LWE instantiation and the depth of the computational circuit, which achieving sublinear overhead for communication.
Related work section describes the Related Work in the area of secure multiparty computation, and Preliminaries section provides an overview of multilinear maps, learning with errors (LWE), universally composable (UC), garbled circuit, and zero-knowledge proof.Protocol construction section describes the specific construction of the scheme in this paper, and Security demonstration section is a security demonstration of the scheme construction.Finally, we summarize our work in Conclusions section.

Related work
Secure multiparty computation with constant rounds was first studied in [28] to reduce the number of interaction rounds, Gordon et al. [29] designed SMPC protocols with constant rounds in honest majority to ensure that the parties have fairness as well as the output is delivered correctly (Table 1).A series of subsequent works target the security of SMPC, based on various difficult assumptions to design protocols for information security against malicious adversaries [30][31][32].Garbled circuits combined with non-committing encryption (NCE) under the plain model to construct secure multiparty computation protocols with adaptive constant rounds are also described for some extensions and applications [33].By combining cryptographic primitives, based on learning with errors (LWE) assumptions use fully homomorphic encryption [34] to construct two rounds of secure multiparty computation, allowing one round of distributed decryption of ciphertexts with multiple secret keys [35,36], which gave a great impetus to later research.The bilinear mapping operation provides a unique operation for secure multiparty computation that would encode the input and then perform the operation, and the evaluation process takes as input the set of confusing protocol components with labels corresponding to the input encoding of each party, and outputs the entire text of the distributed protocol [37], which in turn incorporates the garbled circuit to design the garbled protocol.With the study and development of lattice trapdoors [38][39][40], constructing encoding schemes based on trapdoors and improving the security level of the schemes under the LWE assumption, hierarchical multilinear encoding has been widely used in cryptography, from non-interactive key exchange protocols to broadcast and attribute-based encryption.ciampi et al [41] for the construction of secure two-party computation using oblivious transfer protocols, the construct such protocols from permutations of trapdoors based on four rounds of non-extensible zero-knowledge arguments for delayed inputs.The development of UC [42,43] likewise has many applications in the field of secure multiparty computation.In the framework of UC, the security of the protocol relies on the security of UC to achieve indistinguishability between ideal and realistic environments.In the concept of static security, protocols for sublinear communication are constructed using threshold FHE as well as zero-knowledge proofs (NIZK) [44], which typically require four rounds of interaction under the threshold PKI model and five rounds under the CRS model.The optimization of the number of rounds is carried out in the honest majority setting, and the protocol design is carried out in the model where the circuit size is the polynomial communication size [24,29], thus achieving static security.Existing studies have shown that high communication overhead, high complexity of rounds and low security strength in secure multiparty computation.The solution in this paper is dedicated to the optimization of the number of rounds and the communication overhead, introducing harder security assumptions and improving the notion of security.

Preliminaries
In this section we will review multilinear maps, learning with errors (LWE), universally composable(UC), garbled circuit, and zero-knowledge proof.We denote k ∈ N as the security parameter and for all n ∈ N ,[n] is denoted as {1, 2, ..., n} .PPT denotes probabilistic poly- nomial time and poly denotes positive polynomial.For a function µ with µ(k) < 1 poly(k) , the function µ is said to be negligible.let x = (x 1 , x 2 , ..., x n ) be a vector, the norm of a vector x is defined as �x� ∞ = max i (x[i]) .If the two distributions D 1 ,D

Multilinear maps
Multilinear maps [39,40] is a mathematical tool that is abstractly defined and allows us to operate in a series of group elements and to extract a part of the information out of the output in combination with the results.Given t cyclic groups G 1 , G 2 , ..., G t and a target cyclic group G, then for a multilinear maps algorithm e of order t we have.
where g 1 , g 2 , ..., g t distributions represent t cyclic groups G 1 , G 2 , ..., G t generators, g is denoted as the generators of the target group G, x 1 , x 2 , ..., x t ∈ {0, 1} * , we can consider ) as the encoding of x i , and the t-order multi- linear maps algorithm can encode the t unknown characters x 1 , x 2 , ..., x t string encoding g 1 x 1 , g 2 x 2 , ..., g t x t on which x 1 , x 2 , ..., x t on the group G with the joint product encod- ing g x i ,i∈ [t] .Similarly we can get the corresponding additive operations, if ⊞ denotes the operations defined in the group, we have g x 1 ⊞ g x 2 ) = g x 1 +x 2 .However, for multilinear maps of order t, we can only perform at most multiplication of t layers and addition of any layer.For multilinear maps, the result after computation is presented in the form of ciphertext, and we can extract a part of the information of the ciphertext using the zero test algorithm.ZeroTest algorithm:Given an element h, the ZeroTest algorithm verifies that h is an element of the target group G.
If h = g 0 then there is h is an element in the target group G.If h = g 0 then h is not an element in the target group G.

Learning with errors
The trapdoor-based LWE design has also been developed through the study of lattice trapdoors [38], where K denotes the security parameter and the parameters n = n(k), q = q(k) of the LWE [45] instance are chosen to be integers, χ = χ(k) is a distribution over Z, and LWE n,q,m assumes that for all polynomi- als m = m(k) there is the following distribution that is indistinguishable.
where A ← Z n×m q , s ← Z n q is the input vector, e ← χ m denotes the noise vector and z ← Z m q .In the LWE scheme with trapdoor [17,19], for any m ′ ∈ N , A is rep- resented as a uniform random distribution matrix with (1) (3) trapdoor R ∈ Z m ′ ×n log q q and constructing the LWE hard problem based on this matrix, another matrix D 1 can be generated by the matrix with trapdoor A such that AD 1 = sA 1 + e 1 ,SimilarlyA 1 D 2 = sA 2 + e 2 , where the matrix A 1 is also a uniform random distribution matrix with a trap R 1 , that is, we can generate the D i matrix of the current level based on the trapdoor R i−1 of the pre- vious level, and the whole process forms a nested chain structure.
Theorem 1 (secure MPC with sublinear communication [26,46], informal).Assuming LWE and secure erasures (alternatively, sub-exponential iO), every function can be securely computed by a 2-round protocol tolerating a malicious adversary that can adaptively corrupt all of the parties, such that the communication complexity, the online-computation complexity, and the size of the common reference string are sublinear in the function size.

Universally composable
In [46][47][48] the universally composable framework is defined as the following two models and indistinguishable security properties are formed in the two models, resulting in UC security as well as compositional security.
Real Model: The whole execution process consists of a UC environment Z, an adversary A, and n participants, which starts with Z invoking all participants, generating all inputs and being able to read all outputs, and ends with Z outputting the result of the whole execution.The output of the environment Z under the realistic model is denoted by Real π ,A,Z (x, k, r) , where π denotes the proto- col run by n participants according to the above specification, k is the security parameter, and r denotes the random information.
Ideal Model: F denotes an ideal function under an ideal model, S (simulator) denotes an ideal adversary, n Turing machines denote the participants and an environment Z.Under the ideal model, F defines the behavior of the desired computation and receives inputs from the participants to perform the computation, and then sends the output back to the participants.s cannot see the communication between the participants and F, but s can communicate with F. Denote the environment Z output under the ideal model by Ideal F ,S,Z (x, k, r) , where x denotes the input, k is the security parameter, and r denotes the random information.
Definition 1 (UC Security).Given a protocol π , an ideal function F, if for any PPT adversary A and the existence of an adversary S under an ideal model, the following distribution is computationally indistinguishable for any environment Z.The protocol π is UC-realized in the presence of adversaries with an ideal function F.
Hybrid Model:The F-hybrid model combines the rational model with the realistic model, extending the realistic model with an ideal function F. Each participant can interact with F. The output of Z under the hybrid model is denoted by Hybrid F π ,A,Z (x, k, r).

Definition 2 (security under hybrid model).
Given an F and G are ideal function, π is a protocol run by n participants and π satisfies the UC-implementation ideal function G in the F-hybrid model, if for an adversary A in the hybrid model, there exists an adversary S under the ideal model such that the environment Z computation is indistinguishable from the following two distributions.
Theorem 2 (UC Compositional Security).a UC-implementation F-protocol π , for any F-hybrid protocol ρ , has a combined protocol ρ π simulating the execution of the pro- tocol ρ , for adversary A, ideal adversary S, and no environ- ment Z capable of distinguishing with a non-negligible probability whether it is interacting with an adversary A and the protocol ρ π interacts with, or interacts with S and the pro- tocol ρ .In other words, ρ is an F-hybrid protocol, π is a UC- implementation of F, and then there is ρ π UC-realized of ρ.

Garbled scheme
π is an n-participant protocol, x i denotes the input of participant P i , π i denotes the next message function of participant P i , when π uses x 1 , ..., x n as input to run as π (x 1 , ..., x n ) , also as the output of the protocol.
Definition 3 (Garbled scheme GC): a Garbled scheme [30,33,37] consists of the following polynomial-time algorithmic tuple GC=Setup,Garble,Eval, and some security features: Setup(1 k ):This is a polynomial time algorithm that takes as input a security parameter and outputs a common reference string CRS. (5) Garble(CRS, i, π i , x i ):This polynomial-time algorithm takes as input the common reference string CRS, index i, π i , and the parties' input values x i , and outputs.(1) The next message function π i is Garbled composed π i .
(2) The input value x i is encoded x i with length l e .(3) The corresponding coded labels lab i j,0 , after the input coding of a set of parties.
Eval( π i , x i , lab i x 1 ||...|| x n ):The input π i , the encoded input set x i and the corresponding x 1 ||...|| x n encodes the input label lab i x 1 ||...|| x n , the output result value y or terminator ⊥.Correctness: for n-party agreement π and the set of inputs {x i } i∈ [n] for each party we have: Security:For all protocols π , all subsets of honest par- ticipants H ∈ [n] , and the inputs H ∈ [n] chosen by each participant there exists a PPT algorithm such that: where

Non-interactive zero-knowledge proofs
The NIZK [29,44,46] function is based on the zeroknowledge function in [47], which adjusts and obtains special properties of non-interactive zero-knowledge proof.The argument of NIZK is just a bit string, which anyone can use to verify the validity of the statement.The ideal function F R nizk is represented as follows.
CRS, π i , x i , lab i The NIZK ideal function is parameterized by an NP relation R with n participants P 1 , P 2 , ..., P n ., P n , partici- pant P i can send a prove request, denoted as (x, w), and the function verifies whether (x, w) ∈ R and asks the adversary S to generate a proof π for statement x.The function stores (x, π) and returns the proof to P i .For the other participants p j j∈[n],j / ∈i can send a verify request, denoted as (x, π),if (x, π) has been stored, the function outputs 1, otherwise the adversary is asked to present a proof w.If (x, w) ∈ R the function returns 1, otherwise it returns 0.The proof for the following Theorem 3 is detailed in the literature [46].

Theorem 3 (informal).
Assuming LWE, if there exists adaptively secure NIZK arguments for NP, there exists adaptively secure NIZK arguments for NP with proof size sublinear in the circuit size of the NP relation.

Protocol construction
In this section we construct protocols using a series of related techniques, firstly the construction of trapdoor matrices, secondly the application to secure multiparty computation using a trapdoor-based LWE encoding scheme to propose ideal functions that satisfy the properties of secure multiparty computation, and then a realistic protocol π smpc .

N-participant trapdoor matrix construction
For performing trapdoor matrix construction in secure multiparty computation, we apply a variant scheme based on the trapdoor construction in [38] on secure multiparty computation.Given is required to satisfy the following requirements when the thresh- , R is chosen randomly from the dis- crete Gaussian distribution, denoted as a trapdoor, and has �x i R� ∞ ≤ �x i � ∞ 2nlog(q) .Choose a uniform dis- tribution matrix A 2 ∈ Uniform Z n×m 1 and set The generation of n trapdoors is performed in the setup session of the protocol, and a matrix A i with trap- doors R i is generated corresponding to each participant P i according to the introduction of a Common Refer- ence String (CRS).the following is the generation algorithm for the n trapdoor matrix.

Algorithm 1 n trapdoor matrix generation algorithm
In the process of trapdoor matrix, we use the CRS, which stores the parameters of the participants to generate the trapdoor matrix, when the participants receive the CRS can be integrated to generate their own corresponding matrix, the whole process is only related to the security parameter k, the whole generation process is polynomial time size poly(k).

SMPC in trapdoor LWE-based multilinear maps
We propose an encoding computation scheme for secure secure multiparty computation based on the graded encoding scheme mentioned in [39,40], using a variant of its scheme applied to secure multiparty computation.A graded encoding scheme consists of the following polynomial program, ges = (PrmGen, InstGen, Sample, Garble.enc,Eval, ZeroTest, Extract): InstGen(gp):Given the global parameter gp, the following processes are instantiated and generated: (1) Use trapdoor-sampling to generate a matrix set U A with a trapdoor set R .Each participant corresponds to a trapdoor matrix under a common random reference string and has the following properties.
(2) Generate the public parameters pp:=(x, {A i : A i ∈ U A }) , where x denotes the public parameter used for the proof, and the private parameter sp:=R i : R i ∈ R. ( Sample(pp):Generate an input plaintext to implement sampling an LWE input S ← Z n q .Garble.Enc(pp, sp, S) : The input matrix A i ∈ U A , and the set of trapdoors R, the input s i ← S , samples an LWE error matrix e i ← χ m or �e , computes ) : The calculation operations include addition and multiplication operations as follows.
N participants P 1 , P 2 , ..., P n ,with s 1 , s 2 , . . ., s n cor- responding to the inputs of each participant, where s i ← Z n q , i = [n].There are n + 1 sets of matrices with trapdoors U A = {A, A 1 , . . ., A n } and each participant encodes s i using the corresponding matrix A i ∈ U A , P 1 encodes A D 1 = s 1 A 1 +e 1 for its own s 1 , and P 2 encodes A 1 D 2 = s 2 A 2 +e 2 for its own s 2 until P n encodes A n−1 D n = s n A n +e n , the whole process forms a nested chain structure that generates the current matrix D i based on the matrix A i−1 with trapdoors at the previous level, so that the input s i is encoded into D i and s i is hidden.
In a multilinear maps system, given n pairwise operations from level 1 to n, A as well as D i , i ∈ [n] , the coding results of all participants are multiplied together: Where e noise denotes the noise obtained by the final mul- tiplication, which is obtained by the product of the above equation encoding the s 1 s 2 ....s n instances, performing n levels of nesting.In the information with the same order encoding can be combined with each other for addition subtraction operations, which can be expressed as g s 1 i , g s 2 i in the initial multilinear maps, for addition and subtraction operations to calculate g s 1 ±s 2 i .In the multilinear maps system with trapdoor LWE instances, for D ′ i with D i that has encoded s ′ i with s i of the same order i, making addition and subtraction operations yields.
If there are multiple D i of the same order, we can get at this point we can get noise , the same can be obtained from the operation of subtraction, at this point the multilinear maps system to achieve the basic operation.(9) ZeroTest(pp, A D i ) : Given the matrix D i after the LWE encoding input, the result obtained by the Operation operation combined with the multilinear maps operation,If and only if ,the ZeroTest program outputs 1.
Extract(pp, A D i ) : The extractor takes as input the pub- lic parameter pp, A D i , and outputs a string that repre- sents a bit.
For the graded encoding scheme, Fig. 2 represents the process of computation of encoded inputs for each participant, if the noise does not exceed a certain threshold value, it is a bounded value, and the computed information can be extracted from the ZeroTest program and Extract program, ZeroTest program and Extract program for correctness are detailed in [40].The operation of multiparty computation in a multilinear maps system is given below.

Algorithm 2 Evaluation algorithm Ideal function F smpc
There are n mutually distrustful participants P 1 , P 2 , ..., P n want to jointly compute in polynomial time the computable function f (x 1 , x 2 , ..., x n ) = (y 1 , y 2 , ..., y n ) , where x 1 , x 2 , ..., x n are the input variables, y 1 , y 2 , ..., y n are the output values.The protocol π of a multiparty computa- tion of a computational function should satisfy the following requirements: (1) Privacy: The input information of each participant is invisible with respect to other participants, each participant does not obtain more information from other participants than what is inferred from its own results.(2) Correctness: the protocol π can correctly calculate the function f and return the corresponding correct result.
(3) Security: each party gets the corresponding correct output, and no other additional information can be obtained.
In this paper, we design a secure multiparty computation protocol based on the above requirements and design a secure multiparty computation ideal function F smpc : {0, 1} l in n → {0, 1} l out as shown below:

Cloud-based secure multiparty computation protocol π smpc
This section constructs a 2-round protocol π smpc under the LWE assumption, based on LWE encoding the input, using multilinear maps operations to compute it locally before transmitting it over the broadcast channel, with the following protocol.A total of three phases which including prephase and 2 rounds of interaction processes, as included in Fig. 3, enable each participant to safely compute each encoded input, through 2 rounds of communication and local computation, so as to compute the corresponding computational function result values.
After each participant receives the output result y on the broadcast channel, a ZeroTesttest will be performed on the result.If i=[n] s i is 0, only the noise distribution remains, and the threshold of the noise is used to determine whether the result encodes a value of 0. By simply designing the circuit using a combination of multilinear maps, the specific information contained in the ciphertext can be gradually inferred by a ZeroTest algorithm and extracted using a The extractor Extract is a very randomized extractor.However, ZeroTest cannot reveal too much information about the ciphertext, so we can use ZeroTest to extract part of the information for our computational purpose with certain security.
Semi-Malicious Security.A semi-malicious protocol can be defined over a broadcast channel where the input must be encrypted and then transmitted.This scheme is based on the LWE assumption that the n inputs are all elements in Z n q in an honest majority setting of the participants, and the inputs are encoded and then broadcast for transmission by an LWE instance, with each participant Fig. 2 The process of computation of encoded inputs for each participant Theorem 4 (Theorem 1, restated).Assume the existence of a special ges scheme and NIZK scheme with LWE assumption, and that F : {0, 1} l in n → {0, 1} l out is an effectively computable function of depth d.The function F smpc can be implemented by a communication under an honest majority of the hybrid model two-round protocol UC realized with poly(l in , l out , d, k, n) complexity and tol- erates the presence of semi-malicious adversaries.

Security demonstration
Secure Multi-Party Computation has two kinds of security, static security and adaptive security, static security means that during the operation of the MPC protocol, the security of the protocol can be guaranteed as long as the number of participants does not exceed the maximum number of participants predefined by the protocol.In other words, in the static security model, once the number of participants is determined, then the security of the protocol can be guaranteed.Adaptive security means that during the operation of the MPC protocol, even if there are malicious participants trying to interfere with the operation of the protocol, the security of the protocol is still guaranteed.the operation of the protocol, the security of the protocol can still be guaranteed.In realistic protocols, since a matrix U A with trapdoors is used to generate a series of D-matrices, will the original privacy inputs be exposed in the presence of trapdoors and also the encoded D-matrices of the privacy inputs are disclosed?A specific elaboration is given in [40].According to the encoding rules, the two matrices A i−1 with trapdoor are nested with A i , denoted as A i−1 D i = s i A i +e i , and when encoding to the last one A n−1 D n = s n A n + e n , the trapdoor of matrix A n is not involved in the calculation, if s n distribution is ran- domized enough, then the whole encoding process is an LWE instance.According to the LWE assumption, the last encoding process is represented by a uniform random distribution matrix △ , A n−1 D n = △ , which becomes known as the product of A n−1 and D n as a uniform random dis- tribution matrix △ .Given a trapped A n−1 with a trapdoor and a uniformly randomly distributed matrix △ , if D n can be generated without this trapdoor, then A n−1 with D n does not give away information about the trapdoor.Suppose there are two environments, real and simulated, and in the real environment using the trapdoor of A n−1 trap- door to generate D n in the real environment and not using A n−1 trapdoor to generate in the simulated environment, the results of the two are computationally indistinguishable.The following lemma was obtained according to the literature [40].If the LWE assumption holds, the input encoded based on the trapdoor LWE assumption is secure.

Theorem 5
The ideal function F smpc is a polynomial- time computable deterministic function with N inputs and one output, and the protocol ges = (PrmGen, InstGen, Sample, Garble.enc,Eval, ZeroTest, Extract) is Secure multiparty computation in trapdoor LWE-based multilinear maps operations, then the protocol π smpc UC realized the ideal function F smpc in the honest majority participant setting.

Proof
To demonstrate security under an honest majority of participants based on a valid PPT simulator Sim, Adv represents a static semi-malicious adversary and the simulator is simulated as follows.
The Simulator: In the first round, it can encrypt the false inputs s i and get the inputs of the other participants on the "witness tape", which can encode the inputs.And send these inputs to the ideal function and receive the corresponding output y.After getting this result, the simulator computes y ← Sim.eval( π i , s i , D i , lab i ) and broadcast it.
Hybrid Games: Define a series of hybrid games to demonstrate the indistinguishability of real and ideal scenarios: The output of the entire environment Z is used as the output of each game.
The game Real π smpc ,Adv,Z : In the real world, the proto- col π smpc is executed in the environment Z in the pres- ence of a semi-malicious adversary Adv.
The game HYB 1 π smpc ,Adv,Z : In this game, we modify the experiment of Real π smpc ,Adv,Z as follows, introducing the F R nizk -hybrid model, where each participant P i encodes its own input followed by (prove, sid, x, s i ) to F R nizk , outputs a Proof π , and sends (proof , sid, D i , π) for broadcast, and when participant P j j∈[n]\i receives the message, P j sends a verification request to F R nizk (verify, sid, x, π) , and F R nizk returns 1 or 0 after verification.

Proof
Let Adv be the adversary in the real environment and Sim denote the adversary in the ideal environment such that for any environment Z only the real or ideal environment can be distinguished with negligible probability, and for the adversary Sim in the ideal environment, any input from the environment Z is sent to Adv and any output of Adv is regarded as the output of Sim.For the adversary Sim in interaction with the ideal function F R nizk , provide input s i , and when (proof , sid, D i , π) is received from F R nizk , emulate an identical message for Adv.When the real-world adversary Adv taps participant P i , then the adversary Sim in the ideal environment also taps participant P i and forwards all internal states to Adv.If at this time the adversary Adv replaces the message s i with the false message s i on behalf of the participant P i and forges the proof π ′ against π and broadcasts the message (proof , sid, D i , π ′ ) , when the other participants receive this message and verify the proof when , query whether F R nizk has stored π ′ , and since π ′ is not generated by F R nizk , determine whether (x, D i ) ∈ R .According to the security of LWE assumptions and the security of zero-knowledge proofs, only the input encoded by LWE instances can pass the verification , in other words, the probability that a non-LWE encoded input passes verification is negligible.
So HYB 1 πsmpc ,Adv,Z is indistinguishable from Real π smpc ,Adv,Z computation, and the scheme under the hybrid model is semantically secure.
The game HYB 2 π smpc ,Adv,Z : Unlike HYB 1 π smpc ,Adv,Z , a realistic proof protocol π nizk will be used instead of the ideal function F R nizk , modifying the proof process to a local circuit for computation.

Proof
realistic zero-knowledge proof protocol notated as π nizk , composed by the garbled circuit GC, first gener- ates the proof parameters (S p , S v ) ← GC.Setup(1 K ) through the circuit, which in turn computes the proof π ← GC.Prove(S p , x, D i ) , sends S v , π is broadcasted (11) Pr and sent at the first round, and the other participants compute GC(x, D i ) through the NAND gate for Ver- ify 0/1 ← GC.Verify(S v , x, π) .If the LWE assumption holds, since the probability that an adversary performs a pseudo-proof under a protocol with honest majority participants and is adopted by honest participants is negligible, for environment Z, it does not distinguish whether it is in the environment where the protocol π nizk interacts with Adv or in the environment where F R nizk interacts with Sim.In other words, if the LWE assumption holds, the protocol π nizk can UC to achieve the ideal function F R nizk .
The game Ideal F smpc ,Sim,Z : computes the ideal function F smpc and outputs the result correctly under the ideal model.

Proof
experiments by the semantic security of the underlying ges scheme, encryption of the input by LWE assumptions, and then computation using multilinear maps operations, encryption is computationally indistinguishable, π smpc is able to compute the encoded input correctly and get a correct in the presence of semi-malicious adversaries, honest majority of participants output, and since the protocol π nizk can UC the ideal function F R nizk , from Theorem 2 it follows that the protocol π smpc can UC the ideal function F smpc , then HYB 2 π smpc ,Adv,Z and Ideal F smpc ,Sim,Z computa- tion is indistinguishable.
Combining the above statements, we get Real π smpc ,Adv,Z c ≡ Ideal F smpc ,Sim,Z , which leads to the proof of Theorem 5.
To conclude, Tables 1 and 2 summarize the previous work and the results of this paper in an honest majority setting, the main parameters considered are security, number of rounds, communication complexity, setup settings, etc.Under the LWE assumption, this scheme requires only 2 rounds of communication interactions for secure distributed multi-party secure computation and achieves static security in an honest majority of settings.Compared with previous work, this paper optimizes the number of rounds of secure multiparty computation and reduces the Setup Size, and the communication overhead is sublinear.Although static security is achieved, which already meets the security requirements in most scenarios, this is a minor limitation of the work in this paper, and research improvements for further adaptive security are necessary in future work.

Conclusions
Cloud Secure MultiParty Computation (CSPC) is suitable for a number of application prospects such as cloudbased data streaming information sharing, data trading and e-auctions in distributed environments, for which CSPC provides a secure computation as well as privacy guarantees.In this paper, we combine the concept of cloud computing and secure multiparty computation and use the harder polynomial time puzzle assumption to provide the security concept of the protocol as well as the strength, based on the LWE assumption, the input of the participants is encoded using LWE instances with lattice trapdoor under a graded encoding scheme and transmitted over the broadcast channel, the execution of the protocol is computed by multilinear maps to achieve the optimization of the number of rounds of the secure multiparty computation protocol on the cloud, the communication sublinear overhead, and in the UC framework , the protocol security is achieved through UC security implementation.In future work, it is an important research direction to achieve adaptive security of secure multiparty computation protocols with guaranteed round count optimization and low communication overhead, by combining stronger cryptographic primitives and related techniques to achieve adaptive security of the protocols, while the rise of quantum cryptography also points to a direction for the development of secure multiparty computation.

Table 2
This is an additional description of Table1