On Secure Computation of Solitary Output Functionalities with and Without Broadcast

Bar Alon, Eran Omri

פרסום מחקרי: פרק בספר / בדוח / בכנספרסום בספר כנסביקורת עמיתים

תקציר

Solitary output secure computation models scenarios, where a single entity wishes to compute a function over an input that is distributed among several mutually distrusting parties. The computation should guarantee some security properties, such as correctness, privacy, and guaranteed output delivery. Full security captures all these properties together. This setting is becoming very important, as it is relevant to many real-world scenarios, such as service providers wishing to learn some statistics on the private data of their users. In this paper, we study full security for solitary output three-party functionalities in the point-to-point model (without broadcast) assuming at most a single party is corrupted. We give a characterization of the set of three-party Boolean functionalities and functionalities with up to three possible outputs (over a polynomial-size domain) that are computable with full security in the point-to-point model against a single corrupted party. We also characterize the set of three-party functionalities (over a polynomial-size domain) where the output receiving party has no input. Using this characterization, we identify the set of parameters that allow certain functionalities related to private set intersection to be securely computable in this model. Our characterization in particular implies that, even in the solitary output setting, without broadcast not many “interesting” three-party functionalities can be computed with full security. Our main technical contribution is a reinterpretation of the hexagon argument due to Fischer et al. [Distributed Computing ’86]. While the original argument relies on the agreement property (i.e., all parties output the same value) to construct an attack, we extend the argument to the solitary output setting, where there is no agreement. Furthermore, using our techniques, we were also able to advance our understanding of the set of solitary output three-party functionalities that can be computed with full security, assuming broadcast but where two parties may be corrupted. Specifically, we extend the set of such functionalities that were known to be computable, due to Halevi et al. [TCC ’19].

שפה מקוריתאנגלית
כותר פרסום המארחTheory of Cryptography - 21st International Conference, TCC 2023, Proceedings
עורכיםGuy Rothblum, Hoeteck Wee
מוציא לאורSpringer Science and Business Media Deutschland GmbH
עמודים94-123
מספר עמודים30
מסת"ב (מודפס)9783031486173
מזהי עצם דיגיטלי (DOIs)
סטטוס פרסוםפורסם - 2023
אירוע21st International conference on Theory of Cryptography Conference, TCC 2023 - Taipei, טייוואן
משך הזמן: 29 נוב׳ 20232 דצמ׳ 2023

סדרות פרסומים

שםLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
כרך14370 LNCS
ISSN (מודפס)0302-9743
ISSN (אלקטרוני)1611-3349

כנס

כנס21st International conference on Theory of Cryptography Conference, TCC 2023
מדינה/אזורטייוואן
עירTaipei
תקופה29/11/232/12/23

טביעת אצבע

להלן מוצגים תחומי המחקר של הפרסום 'On Secure Computation of Solitary Output Functionalities with and Without Broadcast'. יחד הם יוצרים טביעת אצבע ייחודית.

פורמט ציטוט ביבליוגרפי