Insured MPC: Efficient Secure Computation with Financial Penalties

被引:20
|
作者
Baum, Carsten [1 ]
David, Bernardo [2 ]
Dowsley, Rafael [3 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] IT Univ Copenhagen, Copenhagen, Denmark
[3] Bar Ilan Univ, Ramat Gan, Israel
基金
欧洲研究理事会;
关键词
D O I
10.1007/978-3-030-51280-4_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fairness in Secure Multiparty Computation (MPC) is known to be impossible to achieve in the presence of a dishonest majority. Previous works have proposed combining MPC protocols with cryptocurrencies in order to financially punish aborting adversaries, providing an incentive for parties to honestly follow the protocol. The focus of existing work is on proving that this approach is possible and unfortunately they present monolithic and mostly inefficient constructions. In this work, we put forth the first UC secure modular construction of "Insured MPC", where either the output of the private computation (which describes how to distribute funds) is fairly delivered or a proof that a set of parties has misbehaved is produced, allowing for financial punishments. Moreover, both the output and the proof of cheating are publicly verifiable, allowing third parties to independently validate an execution. We present an efficient compiler that implements Insured MPC from an MPC protocol with certain properties, a standard (non-private) Smart Contract and a publicly verifiable homomorphic commitment scheme. As an intermediate step, we propose the first construction of a publicly verifiable homomorphic commitment scheme with composability guarantees.
引用
收藏
页码:404 / 420
页数:17
相关论文
共 50 条
  • [21] An efficient simulation for quantum secure multiparty computation
    Kartick Sutradhar
    Hari Om
    Scientific Reports, 11
  • [22] Efficient Secure Multiparty Computation with Identifiable Abort
    Baum, Carsten
    Orsini, Emmanuela
    Scholl, Peter
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 461 - 490
  • [23] Efficient and Secure Federated Learning for Financial Applications
    Liu, Tao
    Wang, Zhi
    He, Hui
    Shi, Wei
    Lin, Liangliang
    An, Ran
    Li, Chenhao
    APPLIED SCIENCES-BASEL, 2023, 13 (10):
  • [24] Integrating Merkle Trees with Transformer Networks for Secure Financial Computation
    Wang, Xinyue
    Lin, Weifan
    Zhang, Weiting
    Huang, Yiwen
    Li, Zeyu
    Liu, Qian
    Yang, Xinze
    Yao, Yifan
    Lv, Chunli
    APPLIED SCIENCES-BASEL, 2024, 14 (04):
  • [25] SEVCOD: secure and efficient verifiable computation on outsourced data
    Chakraborty, Partha Sarathi
    Gavhane, Omkar Santosh
    Tripathy, Somanath
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4725 - 4739
  • [26] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [27] Efficient Secure Similarity Computation on Encrypted Trajectory Data
    Liu, An
    Zheng, Kai
    Li, Lu
    Liu, Guanfeng
    Zhao, Lei
    Zhou, Xiaofang
    2015 IEEE 31ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2015, : 66 - 77
  • [28] An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation
    Luo, Xiaoshuang
    Yang, Xiaoyuan
    Niu, Xiangzhou
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 328 - 339
  • [29] Joint encryption and message-efficient secure computation
    Franklin, M
    Haber, S
    JOURNAL OF CRYPTOLOGY, 1996, 9 (04) : 217 - 232
  • [30] An Efficient and Secure Scheme of Verifiable Computation for Intel SGX
    Ding, Wenxiu
    Sun, Wei
    Yan, Zheng
    Deng, Robert H.
    Wan, Zhiguo
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 473 - 482