Network Agnostic Perfectly Secure Multiparty Computation Against General Adversaries

被引:0
|
作者
Appan, Ananya [1 ,2 ]
Chandramouli, Anirudh [1 ,3 ]
Choudhury, Ashish [1 ]
机构
[1] Int Inst Informat Technol Bangalore, Bengaluru 560100, India
[2] Univ Illinois, Siebel Sch Comp & Data Sci, Champaign, IL 61801 USA
[3] Bar Ilan Univ, Comp Sci Dept, IL-52900 Ramat Gan, Israel
关键词
Protocols; Fault tolerant systems; Fault tolerance; Computational modeling; Communication networks; Resilience; Multi-party computation; Information technology; Delays; Upper bound; Perfect security; MPC; verifiable secret sharing; Byzantine agreement; synchronous network; asynchronous network; non-threshold adversary; AGREEMENT;
D O I
10.1109/TIT.2024.3470513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we initiate the study of network- agnostic perfectly-secure multi-party computation (MPC) against general ( non-threshold) adversaries, where the corruption capacity of the adversary is specified through an adversary structure, which is a set of potentially corrupt subsets of parties. Known MPC protocols are designed either assuming a synchronous network where every sent message is guaranteed to be delivered within some known time or assuming an asynchronous network where no timing assumptions are made and every sent message is eventually delivered. Perfectly-secure MPC protocols in the synchronous network can be designed as long as the underlying adversary structure satisfies the Q( (3)) condition, meaning that the union of no three subsets from the adversary structure covers the entire set of parties. On the other hand, perfectly- secure MPC protocols in the asynchronous network can be designed only against Q ((4)) adversary structures, meaning that the union of no four subsets from the adversary structure covers the entire set of parties. A natural question is whether a single MPC protocol exists, which remains secure even if the parties are unaware of the network conditions at execution time. That is, if the synchrony is satisfied throughout the protocol execution then the protocol should be secure against any Q( (3)) adversary structure. However, even if any synchrony assumption is violated during the execution, the protocol should still be secure against any Q( (4)) adversary structure. We answer the above question affirmatively. Fix any adversary structure Z(s) and Z(a) satisfying Q ((3)) and Q( (4)) conditions respectively, such that Z(a) subset of Z(s). We show the existence of a network-agnostic perfectly- secure MPC protocol tolerating Z(s) and Z(a) in synchronous and asynchronous networks respectively as long as the Q( (3 , 1)) condition is satisfied, meaning that the union of no three subsets from Z(s) and one subset from Z(a) covers the entire set of parties. Our result generalizes the result of Appan, Chandramouli and Choudhury (IEEE Transactions on IT, 2023), which presents the only known perfectly-secure network-agnostic MPC protocol against threshold adversaries.
引用
收藏
页码:644 / 682
页数:39
相关论文
共 50 条
  • [21] Perfectly-Secure Multiparty Computation with Linear Communication Complexity over Any Modulus
    Escudero, Daniel
    Song, Yifan
    Wang, Wenhao
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT VI, 2025, 15489 : 102 - 132
  • [22] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [23] Secure Network Coding Against the Contamination and Eavesdropping Adversaries
    Zhou Yejun
    Li Hui
    Ma Jianfeng
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (03): : 411 - 416
  • [24] Secure multiparty computation of DNF
    Peng, Kun
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 254 - 268
  • [25] Secure Multiparty Computation of Approximations
    Feigenbaum, Joan
    Ishai, Yuval
    Malkin, Tal
    Nissim, Kobbi
    Strauss, Martin J.
    Wright, Rebecca N.
    ACM TRANSACTIONS ON ALGORITHMS, 2006, 2 (03) : 435 - 472
  • [26] Secure Multiparty Graph Computation
    Kukkala, Varsha Bhat
    Iyengar, S. R. S.
    Saini, Jaspal Singh
    2016 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS), 2016,
  • [27] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [28] General quantum secure multiparty computation protocol for simultaneous summation and multiplication
    Li, Fulin
    Luo, Mei
    Zhu, Shixin
    Pang, Binbin
    PHYSICA SCRIPTA, 2024, 99 (01)
  • [29] POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries
    Zhu, Ruiyu
    Huang, Yan
    Cassel, Darion
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 245 - 257
  • [30] Better Preprocessing for Secure Multiparty Computation
    Baum, Carsten
    Damgard, Ivan
    Toft, Tomas
    Zakarias, Rasmus
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 327 - 345