On Communication Models and Best-Achievable Security in Two-Round MPC

被引:3
|
作者
Goel, Aarushi [1 ]
Jain, Abhishek [1 ]
Prabhakaran, Manoj [2 ]
Raghunath, Rajeev [2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Indian Inst Technol, Mumbai, Maharashtra, India
来源
关键词
D O I
10.1007/978-3-030-90453-1_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, a sequence of works have made strong advances in two-round (i.e., round-optimal) secure multi-party computation (MPC). In the honest-majority setting - the focus of this work - Ananth et al. [CRYPTO'18, EC'19], Applebaum et al. [TCC'18, EC'19] and Garg et al. [TCC'18] have established the feasibility of general two-round MPC in standard communication models involving broadcast (BC) and private point-to-point (P2P) channels. In this work, we set out to understand what features of the communication model are necessary for these results, and more broadly the design of two-round MPC. Focusing our study on the plain model - the most natural model for honest-majority MPC - we obtain the following results: - Dishonest majority from Honest majority: In the two round setting, honest-majority MPC and dishonest-majority MPC are surprisingly close, and often equivalent. This follows from our results that the former implies 2-message oblivious transfer, in many settings. (i) We show that without private point-to-point (P2P) channels, i.e., when we use only broadcast (BC) channels, honest-majority MPC implies 2-message oblivious transfer. (ii) Furthermore, this implication holds even when we use both P2P and BC, provided that the MPC protocol is robust against "fail-stop" adversaries. - Best-Achievable Security: While security with guaranteed output delivery (and even fairness) against malicious adversaries is impossible in two rounds, nothing is known with regards to the "next best" security notion, namely, security with identifiable abort (IA). We show that IA is also impossible to achieve with honest-majority even if we use both P2P and BC channels. However, if we replace P2P channels with a "bare" (i.e., untrusted) public-key infrastructure (PKI), then even security with guaranteed output delivery (and hence IA) is possible to achieve. These results "explain" that the reliance on P2P channels (together with BC) in the recent two-round protocols in the plain model was in fact necessary, and that these protocols couldn't have achieved a stronger security guarantee, namely, IA. Overall, our results (put together with prior works) fully determine the best-achievable security for honest-majority MPC in different communication models in two rounds. As a consequence, they yield the following hierarchy of communication models: BC < P2P < BC + P2P < BC + PKI. This shows that BC channel is the weakest communication model, and that BC + PKI model is strictly stronger than BC + P2P model.
引用
收藏
页码:97 / 128
页数:32
相关论文
共 13 条
  • [1] Broadcast-Optimal Two-Round MPC
    Cohen, Ran
    Garay, Juan
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT II, 2020, 12106 : 828 - 858
  • [2] Reusable Two-Round MPC from LPN
    Bartusek, James
    Garg, Sanjam
    Srinivasan, Akshayaram
    Zhang, Yinuo
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2022, PT I, 2022, 13177 : 165 - 193
  • [3] Reusable Two-Round MPC from DDH
    Bartusek, James
    Garg, Sanjam
    Masny, Daniel
    Mukherjee, Pratyay
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 320 - 348
  • [4] Two-Round Secure MPC from Indistinguishability Obfuscation
    Garg, Sanjam
    Gentry, Craig
    Halevi, Shai
    Raykova, Mariana
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 74 - 94
  • [5] On the Security of Two-Round Multi-Signatures
    Drijvers, Manu
    Edalatnejad, Kasra
    Ford, Bryan
    Kiltz, Eike
    Loss, Julian
    Neven, Gregory
    Stepanovs, Igors
    2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1084 - 1101
  • [6] Garbled Protocols and Two-Round MPC from Bilinear Maps
    Garg, Sanjam
    Srinivasan, Akshayaram
    2017 IEEE 58TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2017, : 588 - 599
  • [7] Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
    Garg, Sanjam
    Polychroniadou, Antigoni
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 614 - 637
  • [8] Two-Round MPC: Information-Theoretic and Black-Box
    Garg, Sanjam
    Ishai, Yuval
    Srinivasan, Akshayaram
    THEORY OF CRYPTOGRAPHY, TCC 2018, PT I, 2018, 11239 : 123 - 151
  • [9] Two-Round MPC Without Round Collapsing Revisited - Towards Efficient Malicious Protocols
    Lin, Huijia
    Liu, Tianren
    ADVANCES IN CRYPTOLOGY - CRYPTO 2022, PT I, 2022, 13507 : 353 - 382
  • [10] Two-Round Adaptively Secure MPC from Isogenies, LPN, or CDH
    Alamati, Navid
    Montgomery, Hart
    Patranabis, Sikhar
    Sarkar, Pratik
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT II, 2021, 13091 : 305 - 334