Optimally Hybrid-Secure MPC

نویسندگان

  • Christoph Lucas
  • Dominik Raub
  • Ueli Maurer
چکیده

Most protocols for multi-party computation (MPC) are secure either against information-theoretic (IT) or against computationally bounded adversaries. Hybrid-secure MPC protocols guarantee different levels of security, depending on the power of the adversary. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ < n 2 we obtain an MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t < n 2 and computationally secure with agreement on abort (no fairness) for up to t < n − ρ. Our construction is secure in the universal composability (UC) framework (with broadcast and CRS), and achieves the bounds of Ishai et al. [CRYPTO’06], Katz [STOC’07], and Cleve [STOC’86] on trade-offs between robustness and privacy, and on fairness. For example, in the special case ρ = 0 our protocol simultaneously achieves non-robust MPC for up to t < n corrupted parties in the computational setting (like Goldreich et al. [STOC’87]) while providing security with fairness in the IT setting for up to t < n 2 corrupted parties (like Rabin and Ben-Or [STOC’89] though without robustness). A crucial technique in our construction is player emulation, first suggested by Chaum [CRYPTO’89]. In this work we provide a formal and detailed treatment of emulated players in the UC setting.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience

Verifiable Secret Sharing (VSS) is a fundamental primitive used in many distributed cryptographic tasks, such as Multiparty Computation (MPC) and Byzantine Agreement (BA). It is a two phase (sharing, reconstruction) protocol. The VSS and MPC protocols are carried out among n parties, where t out of n parties can be under the influence of a Byzantine (active) adversary, having unbounded computin...

متن کامل

Constant-Round Asynchronous Multi-Party Computation

Secure multi-party computation (MPC) allows several mutually distrustful parties to securely compute a joint function of their inputs and exists in two main variants: In synchronous MPC parties are connected by a synchronous network with a global clock, and protocols proceed in rounds with strong delivery guarantees, whereas asynchronous MPC protocols can be deployed even in networks that deliv...

متن کامل

Model Predictive Control of Hybrid Systems with Applications to Supply Chain Management

Hybrid systems are dynamical systems whose behavior is determined by the interaction of continuous and discrete dynamics. Such systems arise in many real contexts, including automotive systems, chemical processes, communication networks, and supply chain management. A supply chain, whose goal is to transform ideas and raw materials into delivered products and services, is an example of a hetero...

متن کامل

Secure Multi-Party Computation with Identifiable Abort

Protocols for secure multi-party computation (MPC) that resist a dishonest majority are susceptible to “denial of service” attacks, allowing even a single malicious party to force the protocol to abort. In this work, we initiate a systematic study of the more robust notion of security with identifiable abort, which leverages the effect of an abort by forcing, upon abort, at least one malicious ...

متن کامل

Secure Protocol Transformations

In the rich literature of secure multi-party computation (MPC), several important results rely on“protocol transformations,” whereby protocols from one model of MPC are transformed to protocolsfrom another model. Motivated by the goal of simplifying and unifying results in the area of MPC, weformalize a general notion of black-box protocol transformations that captures previous tran...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009