Constant-round linear-broadcast secure computation with penalties

نویسندگان

چکیده

It is known that Bitcoin enables achieving fairness in secure computation by imposing monetary penalties on adversarial parties. This functionality called with penalties. Bentov and Kumaresan (2014) [9] introduced the claim-or-refund can be implemented via Bitcoin. They achieved O(n) rounds broadcasts for any function, where n number of After that, [8] showed a constant-round protocol. Unfortunately, this protocol requires O(n2) broadcasts. As far as we know, no achieves O(1) based work accomplishes such efficiency We first show slightly relaxed setting non-equivalent same except every honest party receives more than predetermined amount compensation, while previous one compensation. Namely, our allows compensations parties to non-equivalent. Moreover, present technique remove non-equivalence without sacrificing efficiency. then propose new ideal claim-refund-or-give

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Amortizing Secure Computation with Penalties

Motivated by the impossibility of achieving fairness in secure computation [Cleve, STOC 1986], recent works study a model of fairness in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty to every other party that did not receive the output. These works show how to design protocols for secure computation with penalties that guarant...

متن کامل

Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials

Various information-theoretic constant-round secure multiparty protocols are known for classes such as NC and polynomial-size branching programs [1, 13, 18, 3, 19, 10]. All these protocols have a small probability of failure, or alternatively use an expected constant number of rounds, suggesting that this might be an inherent phenomenon. In the current paper we prove that this is not the case b...

متن کامل

Adaptively Secure UC Constant Round Multi-Party Computation Protocols

We present a universally composable multiparty computation protocol that is adaptively secure against corruption of n − 1 of the n players. The protocol has a constant number of rounds and communication complexity that depends only on the number of inputs and outputs (and not on the size of the circuit to be computed securely). Such protocols were already known for honest majority. However, ada...

متن کامل

Constant-round secure two-party computation from a linear number of oblivious transfer

We construct a protocol for constant round Two-Party Secure Function Evaluation in the standard model which improves previous protocols in several ways. We are able to reduce the number of calls to Oblivious Transfer by a factor proportional to the security parameter. In addition to being more efficient than previous instantiations, our protocol only requires black box calls to OT and Commitmen...

متن کامل

Broadcast-Efficient Secure Multiparty Computation

Secure multiparty computation (MPC) is perhaps the most popular paradigm in the area of cryptographic protocols. It allows several mutually untrustworthy parties to jointly compute a function of their private inputs, without revealing to each other information about those inputs. In the case of unconditional (information-theoretic) security, protocols are known which tolerate a dishonest minori...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2023

ISSN: ['1879-2294', '0304-3975']

DOI: https://doi.org/10.1016/j.tcs.2023.113874