Network Agnostic Perfectly Secure Multiparty Computation Against General Adversaries

被引:0
|
作者
Appan, Ananya [1 ,2 ]
Chandramouli, Anirudh [1 ,3 ]
Choudhury, Ashish [1 ]
机构
[1] Int Inst Informat Technol Bangalore, Bengaluru 560100, India
[2] Univ Illinois, Siebel Sch Comp & Data Sci, Champaign, IL 61801 USA
[3] Bar Ilan Univ, Comp Sci Dept, IL-52900 Ramat Gan, Israel
关键词
Protocols; Fault tolerant systems; Fault tolerance; Computational modeling; Communication networks; Resilience; Multi-party computation; Information technology; Delays; Upper bound; Perfect security; MPC; verifiable secret sharing; Byzantine agreement; synchronous network; asynchronous network; non-threshold adversary; AGREEMENT;
D O I
10.1109/TIT.2024.3470513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we initiate the study of network- agnostic perfectly-secure multi-party computation (MPC) against general ( non-threshold) adversaries, where the corruption capacity of the adversary is specified through an adversary structure, which is a set of potentially corrupt subsets of parties. Known MPC protocols are designed either assuming a synchronous network where every sent message is guaranteed to be delivered within some known time or assuming an asynchronous network where no timing assumptions are made and every sent message is eventually delivered. Perfectly-secure MPC protocols in the synchronous network can be designed as long as the underlying adversary structure satisfies the Q( (3)) condition, meaning that the union of no three subsets from the adversary structure covers the entire set of parties. On the other hand, perfectly- secure MPC protocols in the asynchronous network can be designed only against Q ((4)) adversary structures, meaning that the union of no four subsets from the adversary structure covers the entire set of parties. A natural question is whether a single MPC protocol exists, which remains secure even if the parties are unaware of the network conditions at execution time. That is, if the synchrony is satisfied throughout the protocol execution then the protocol should be secure against any Q( (3)) adversary structure. However, even if any synchrony assumption is violated during the execution, the protocol should still be secure against any Q( (4)) adversary structure. We answer the above question affirmatively. Fix any adversary structure Z(s) and Z(a) satisfying Q ((3)) and Q( (4)) conditions respectively, such that Z(a) subset of Z(s). We show the existence of a network-agnostic perfectly- secure MPC protocol tolerating Z(s) and Z(a) in synchronous and asynchronous networks respectively as long as the Q( (3 , 1)) condition is satisfied, meaning that the union of no three subsets from Z(s) and one subset from Z(a) covers the entire set of parties. Our result generalizes the result of Appan, Chandramouli and Choudhury (IEEE Transactions on IT, 2023), which presents the only known perfectly-secure network-agnostic MPC protocol against threshold adversaries.
引用
收藏
页码:644 / 682
页数:39
相关论文
共 50 条
  • [41] Secure multiparty computation of a comparison problem
    Liu, Xin
    Li, Shundong
    Liu, Jian
    Chen, Xiubo
    Xu, Gang
    SPRINGERPLUS, 2016, 5
  • [42] Secure Multiparty Computation Goes Live
    Bogetoft, Peter
    Christensen, Dan Lund
    Damgard, Ivan
    Geisler, Martin
    Jakobsen, Thomas
    Kroigaard, Mikkel
    Nielsen, Janus Dam
    Nielsen, Jesper Buns
    Nielsen, Jurt
    Pagter, Jakob
    Schwartzbach, Michael
    Toft, Tomas
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 325 - +
  • [43] Secure Multiparty Computation with Sublinear Preprocessing
    Boyle, Elette
    Gilboa, Niv
    Ishai, Yuval
    Nof, Ariel
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 427 - 457
  • [44] Secure Multiparty Computation Using Secure Virtual Machines
    Miladinovic, Danko
    Milakovic, Adrian
    Vukasovic, Maja
    Stanisavljevic, Zarko
    Vuletic, Pavle
    ELECTRONICS, 2024, 13 (05)
  • [45] On the Message Complexity of Secure Multiparty Computation
    Ishai, Yuval
    Mittal, Manika
    Ostrovsky, Rafail
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2018, PT I, 2018, 10769 : 698 - 711
  • [46] Practical applications of secure multiparty computation
    Talviste, Riivo
    Cryptology and Information Security Series, 2015, 13 : 246 - 251
  • [47] Secure multiparty computation in cloud computing
    Jiang H.
    Xu Q.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (10): : 2152 - 2162
  • [48] Basic constructions of secure multiparty computation
    Laud, Peeter
    Pankova, Alisa
    Kamm, Liina
    Veeningen, Meilof
    Cryptology and Information Security Series, 2015, 13 : 1 - 25
  • [49] Secure multiparty computation for comparator networks
    Morohashi, Gembu
    Chida, Koji
    Hirota, Keiichi
    Kikuchi, Hiroaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (09) : 2349 - 2355
  • [50] Efficient Secure Multiparty Subset Computation
    Zhou, Sufang
    Li, Shundong
    Dou, Jiawei
    Geng, Yaling
    Liu, Xin
    SECURITY AND COMMUNICATION NETWORKS, 2017,