1/p-secure multiparty computation without honest majority and the best of both worlds

Amos Beimel, Yehuda Lindell, Eran Omri, Ilan Orlov

פרסום מחקרי: פרק בספר / בדוח / בכנספרסום בספר כנסביקורת עמיתים

37 ציטוטים ‏(Scopus)

תקציר

A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation, where parties give their inputs to a trusted party which returns the output of the functionality to all parties. In particular, in the ideal model such computation is fair - all parties get the output. Cleve (STOC 1986) proved that, in general, fairness is not possible without an honest majority. To overcome this impossibility, Gordon and Katz (Eurocrypt 2010) suggested a relaxed definition - 1/p-secure computation - which guarantees partial fairness. For two parties, they construct 1/p-secure protocols for functionalities for which the size of either their domain or their range is polynomial (in the security parameter). Gordon and Katz ask whether their results can be extended to multiparty protocols. We study 1/p-secure protocols in the multiparty setting for general functionalities. Our main result is constructions of 1/p-secure protocols that are resilient against any number of corrupt parties provided that the number of parties is constant and the size of the range of the functionality is at most polynomial (in the security parameter n). If less than 2/3 of the parties are corrupt, the size of the domain is constant, and the functionality is deterministic, then our protocols are efficient even when the number of parties is log log n. On the negative side, we show that when the number of parties is super-constant, 1/p-secure protocols are not possible when the size of the domain is polynomial. Thus, our feasibility results for 1/p-secure computation are essentially tight. We further motivate our results by constructing protocols with stronger guarantees: If in the execution of the protocol there is a majority of honest parties, then our protocols provide full security. However, if only a minority of the parties are honest, then our protocols are 1/p-secure. Thus, our protocols provide the best of both worlds, where the 1/p-security is only a fall-back option if there is no honest majority.

שפה מקוריתאנגלית
כותר פרסום המארחAdvances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings
עמודים277-296
מספר עמודים20
מזהי עצם דיגיטלי (DOIs)
סטטוס פרסוםפורסם - 2011
פורסם באופן חיצוניכן
אירוע31st Annual International Cryptology Conference, CRYPTO 2011 - Santa Barbara, ארצות הברית
משך הזמן: 14 אוג׳ 201118 אוג׳ 2011

סדרות פרסומים

שםLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
כרך6841 LNCS
ISSN (מודפס)0302-9743
ISSN (אלקטרוני)1611-3349

כנס

כנס31st Annual International Cryptology Conference, CRYPTO 2011
מדינה/אזורארצות הברית
עירSanta Barbara
תקופה14/08/1118/08/11

טביעת אצבע

להלן מוצגים תחומי המחקר של הפרסום '1/p-secure multiparty computation without honest majority and the best of both worlds'. יחד הם יוצרים טביעת אצבע ייחודית.

פורמט ציטוט ביבליוגרפי