On the Power of Hybrid Networks in Multi-Party Computation

被引:10
|
作者
Patra, Arpita [1 ]
Ravi, Divya [1 ]
机构
[1] Indian Inst Sci, Bengaluru 560012, India
关键词
VSS; MPC; hybrid; synchronous; asynchronous; feasibility; perfect security; FRAMEWORK; PROTOCOLS;
D O I
10.1109/TIT.2018.2827360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perfectly-secure verifiable secret sharing (VSS) and multi-party computation (MPC) protocols in asynchronous network tolerate only at most one-fourth of corruption, while their counterparts in synchronous network sustain against at most one-third corruption. Moreover property-wise, synchronous protocols provide much stronger guarantees than the asynchronous counterparts. Taking note of the fact that asynchronous network is more realistic on one hand and on the other, synchrony of a network has positive impact on several aspects of distributed protocols including properties and fault-tolerance, we explore the power of hybrid networks that combines best of both the worlds by supporting a few synchronous rounds at the onset of a protocol execution, before turning to asynchronous mode. In hybrid networks, we investigate various feasibility questions pertaining to protocols giving guarantees attainable in synchronous and asynchronous networks. For the asynchronous protocols in hybrid networks, we hope to leverage the initial synchronous rounds to bridge the gap in the fault-tolerance with the synchronous protocols under minimal synchrony assumption. We ask the following fundamental question of both theoretical and practical importance: What is the minimum number of initial synchronous rounds necessary and sufficient in a hybrid network to construct asynchronous perfectly-secure VSS and MPC protocols with the fault-tolerance of synchronous protocols? On the positive note, we show that the answer is one for VSS which is clearly optimal. Notably no broadcast oracle is invoked in the synchronous round of our proposed VSS protocol. On the negative side, we prove that one synchronous round is not enough for MPC, putting MPC on a higher pedestal than VSS in terms of difficulty. For synchronous protocols in hybrid networks, we hope to save on the synchronous rounds leveraging conveniently the available asynchronous phase. We settle the question for VSS in the negative showing that three rounds that are known to be necessary (and sufficient) for VSS in synchronous networks, are also required in hybrid networks. VSS being a special case of MPC, the lower bound holds true for MPC. We match the lower bound with a three-round protocol. Notably, synchronous MPC with cryptographic security is known to be achievable in hybrid networks with one synchronous round.
引用
收藏
页码:4207 / 4227
页数:21
相关论文
共 50 条
  • [1] Multi-party computation with hybrid security
    Fitzi, M
    Holenstein, T
    Wullschleger, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 419 - 438
  • [2] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [3] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [4] Secure multi-party computation in large networks
    Dani, Varsha
    King, Valerie
    Movahedi, Mahnush
    Saia, Jared
    Zamani, Mahdi
    DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
  • [5] Efficient Coded Multi-Party Computation at Edge Networks
    Vedadi, Elahe
    Keshtkarjahromi, Yasaman
    Seferoglu, Hulya
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 807 - 820
  • [6] Everlasting Multi-party Computation
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 380 - 397
  • [7] Covert multi-party computation
    Chandran, Nishanth
    Goyal, Vipul
    Ostrovsky, Rafail
    Sahai, Arnit
    48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, : 238 - 248
  • [8] Everlasting Multi-party Computation
    Dominique Unruh
    Journal of Cryptology, 2018, 31 : 965 - 1011
  • [9] Everlasting Multi-party Computation
    Unruh, Dominique
    JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 965 - 1011
  • [10] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159