Optimally Hybrid-Secure MPC
نویسندگان
چکیده
Most protocols for multi-party computation (MPC) are secure either against information-theoretic (IT) or against computationally bounded adversaries. Hybrid-secure MPC protocols guarantee different levels of security, depending on the power of the adversary. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ < n 2 we obtain an MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t < n 2 and computationally secure with agreement on abort (no fairness) for up to t < n − ρ. Our construction is secure in the universal composability (UC) framework (with broadcast and CRS), and achieves the bounds of Ishai et al. [CRYPTO’06], Katz [STOC’07], and Cleve [STOC’86] on trade-offs between robustness and privacy, and on fairness. For example, in the special case ρ = 0 our protocol simultaneously achieves non-robust MPC for up to t < n corrupted parties in the computational setting (like Goldreich et al. [STOC’87]) while providing security with fairness in the IT setting for up to t < n 2 corrupted parties (like Rabin and Ben-Or [STOC’89] though without robustness). A crucial technique in our construction is player emulation, first suggested by Chaum [CRYPTO’89]. In this work we provide a formal and detailed treatment of emulated players in the UC setting.
منابع مشابه
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience
Verifiable Secret Sharing (VSS) is a fundamental primitive used in many distributed cryptographic tasks, such as Multiparty Computation (MPC) and Byzantine Agreement (BA). It is a two phase (sharing, reconstruction) protocol. The VSS and MPC protocols are carried out among n parties, where t out of n parties can be under the influence of a Byzantine (active) adversary, having unbounded computin...
متن کاملConstant-Round Asynchronous Multi-Party Computation
Secure multi-party computation (MPC) allows several mutually distrustful parties to securely compute a joint function of their inputs and exists in two main variants: In synchronous MPC parties are connected by a synchronous network with a global clock, and protocols proceed in rounds with strong delivery guarantees, whereas asynchronous MPC protocols can be deployed even in networks that deliv...
متن کاملModel Predictive Control of Hybrid Systems with Applications to Supply Chain Management
Hybrid systems are dynamical systems whose behavior is determined by the interaction of continuous and discrete dynamics. Such systems arise in many real contexts, including automotive systems, chemical processes, communication networks, and supply chain management. A supply chain, whose goal is to transform ideas and raw materials into delivered products and services, is an example of a hetero...
متن کاملSecure Multi-Party Computation with Identifiable Abort
Protocols for secure multi-party computation (MPC) that resist a dishonest majority are susceptible to “denial of service” attacks, allowing even a single malicious party to force the protocol to abort. In this work, we initiate a systematic study of the more robust notion of security with identifiable abort, which leverages the effect of an abort by forcing, upon abort, at least one malicious ...
متن کاملSecure Protocol Transformations
In the rich literature of secure multi-party computation (MPC), several important results rely on“protocol transformations,” whereby protocols from one model of MPC are transformed to protocolsfrom another model. Motivated by the goal of simplifying and unifying results in the area of MPC, weformalize a general notion of black-box protocol transformations that captures previous tran...
متن کامل