On the Power of Public-Key Encryption in Secure Computation

نویسندگان

  • Mohammad Mahmoody
  • Hemanta K. Maji
  • Manoj Prabhakaran
چکیده

We show that there is a computational primitive which can be used (in a blackbox manner) to securely implement certain 3-party SFE tasks which do not have secure protocols otherwise, but is “useless” for any finite, deterministic 2-party SFE: that is, the only finite, deterministic 2-party SFE that have a secure protocol using this primitive are those which have a secure protocol unconditionally. This leads to a qualitative separation between computational complexity assumptions inherent to 2party secure function evaluation (SFE) and those inherent to 3-party SFE. More precisely, consider the universe of assumptions of the form “f has a semi-honest secure protocol” (in the PPT setting, over a public discussion model); we show that this universe of assumptions corresponding to 3-party functions is strictly larger than that corresponding to 2-party functions (when the elements of this universe are considered distinct unless they are black-box reducible to each other). This answers an open question of Maji et al. (ITCS’10). Technically, we show that there is an oracle with respect to which public-key encryption (PKE) exists, but is useless for all semi-honest 2-party finite, deterministic SFE tasks. This subsumes a result of Gertner et al. (FOCS’00) which showed that PKE is useless for Oblivious Transfer (and hence, for any complete SFE task). This builds on a recent result by the authors [MMP12] which showed that random oracles (with respect to which PKE does not exist either) are useless for such 2-party SFE. As in [MMP12], this extends to security against active adversaries (in which case PKE is only as useful as being given access to the commitment functionality). Apart from our main results, this work significantly advances (and conceptually simplifies) several state-of-the-art techniques in the field of black-box separations: 1. We introduce a general common-information learning algorithm (CIL) which extends the “eavesdroppers” in prior work [IR89, BM09, HOZ13], to protocols whose messages can depend on information gathered by the CIL so far. 2. With the help of this CIL, we show that in a secure 2-party protocol using an idealized PKE oracle, surprisingly, decryption queries are useless. 3. The idealized PKE oracle with its decryption facility removed can be modeled as an imagetestable random-oracle. We extend the analysis approaches of prior work on random oracles [IR89, BM09, DLMM11, MMP12, HOZ13] to apply to this class of oracles; this shows that these oracles are useless for semi-honest 2-party SFE (as well as for key-agreement).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and formal verification of DZMBE+

In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

On Black-Box Complexity of UC Security

In this work, we study the intrinsic complexity of black-box UC secure computation based on general assumptions. We present a thorough study in various corruption modelings while focusing on achieving security in the CRS model (and related setups). Our results involve the following: • Static UC secure computation. Designing the first static UC secure oblivious transfer protocol based on public-...

متن کامل

On Black-Box Complexity of Universally Composable Security in the CRS Model

In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various corruption modelings while focusing on achieving security in the common reference string (CRS) model. Our results involve the following: • Static UC secure computation. Designing the first static UC secure oblivious tran...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Secure Integer Comparisons Using the Homomorphic Properties of Prime Power Subgroups

Secure multi party computation allows two or more parties to jointly compute a function under encryption without leaking information about their private inputs. These secure computations are vital in many fields including law enforcement, secure voting and bioinformatics because the privacy of the information is of paramount importance. One common reference problem for secure multi party comput...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Electronic Colloquium on Computational Complexity (ECCC)

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2013