cronokirby

(2026-02) Perfectly Secure Network-Agnostic MPC Comes for Free

2026-02-24

Abstract

Secure multiparty computation (MPC) allows a set of parties to jointly compute a function while keeping their inputs private. Classical MPC protocols assume either a synchronous or an asynchronous network. Synchronous protocols tolerate more corrupted parties but rely on a timing bound, while asynchronous protocols make no timing assumptions but handle fewer corruptions.

The network-agnostic model aims to combine the advantages of both. It requires security without knowing in advance whether the network is synchronous or asynchronous, guaranteeing resilience against up to tst_s corruptions in the synchronous case and tat_a corruptions in the asynchronous case. The optimal corruption threshold for perfect security has been established as n=2\max(ts,ta)+\max(2ta,ts)+1n = 2\max(t_s, t_a) + \max(2t_a, t_s) + 1, but prior work either falls short of this threshold or requires exponential local computation.

In this work, we present the first perfectly secure network-agnostic MPC protocol with polynomial communication and computation complexity under the optimal threshold. Our protocol achieves expected communication complexity O((Cn+(D+CI)n2+n6)\logn)\mathcal{O}((|C|n + (D+C_I)n^2 + n^6)\log n) bits for a circuit of size C|C| over a finite field F\mathbb{F} of size O(n)\mathcal{O}(n), depth DD, and input size CIC_I.

Our main technical contribution is a compiler that generates Beaver triples in the network-agnostic setting using synchronous and asynchronous triple-generation protocols in a black-box way. Beyond the cost of the underlying protocols, it only requires O(n2)\mathcal{O}(n^2) instances of network-agnostic Byzantine agreement.