Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
نویسندگان
چکیده
An important benchmark for multi-party computation protocols (MPC) is their round complexity. For several MPC tasks, such as broadcast, (tight) lower bounds on the complexity are known. However, some of these can be circumvented when termination every party not a priori known, and simultaneous guaranteed. Protocols with this property called probabilistic-termination (PT) protocols. Running PT in parallel affects resulting protocol somewhat unexpected ways. instance, an execution m constant expected might take $$O(\log m)$$ rounds to complete. In seminal work, Ben-Or El-Yaniv (Distributed Computing ‘03) developed technique arbitrarily many broadcast protocols, while preserving More recently, Cohen et al. (CRYPTO ‘16) devised framework universal composition provided first composable parallel-broadcast simulation-based proof. These constructions crucially rely fact that “privacy-free,” do generalize arbitrary straightforward way. This raises question whether it possible execute parallel, without increasing paper we tackle provide both feasibility infeasibility results. We construct round-preserving compiler, tolerating any dishonest minority actively corrupted parties, compiles into realizing composition, having black-box access underlying Furthermore, prove same cannot achieved, using known techniques, given only functionalities realized by unless merely security against semi-honest corruptions required, which case protocol. To our results, utilize language results al., extend capture reactive functionalities, handle honest majority.
منابع مشابه
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols
An important benchmark for multi-party computation protocols (MPC) is their round com-plexity. For several important MPC tasks, such as broadcast, (tight) lower bounds on the roundcomplexity are known. However, some of these lower bounds can be circumvented when thetermination round of every party is not a priori known, and simultaneous termination is notguaranteed. Protocols wi...
متن کاملSecure Composition of Cryptographic Protocols
General positive results for secure computation were obtained more than two decades ago. These results were for the setting where each protocol execution is done in isolation.With the proliferation of the network setting (and especially the internet), an ambitious effort to generalize these results and obtain concurrently secure protocols was started. However it was soon shown that designing se...
متن کاملComposition of Cryptographic Protocols in a Probabilistic Polynomial-Time Process Calculus
We describe a probabilistic polynomial-time process calculus for analyzing cryptographic protocols and use it to derive compositionality properties of protocols in the presence of computationally bounded adversaries. We illustrate these concepts on oblivious transfer, an example from cryptography. We also compare our approach with a framework based on interactive Turing machines.
متن کاملSecure signal processing: Privacy preserving cryptographic protocols for multimedia
The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready to go fully i...
متن کاملA Probabilistic Scheduler for the Analysis of Cryptographic Protocols
When modelling cryto-protocols by means of process calculi which express both nondeterministic and probabilistic behavior, it is customary to view the scheduler as an intruder. It has been established that the traditional scheduler needs to be carefully calibrated in order to more accurately reflect the intruder’s capabilities for controlling communication channels. We propose such a class of s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Cryptology
سال: 2021
ISSN: ['0933-2790', '1432-1378']
DOI: https://doi.org/10.1007/s00145-021-09377-0