Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output

被引:0
|
作者
Abram, Damiano [1 ]
Doerner, Jack [2 ,3 ,4 ]
Ishai, Yuval [2 ]
Narayanan, Varun [5 ]
机构
[1] Aarhus Univ, Aarhus, Denmark
[2] Technion, Haifa, Israel
[3] Reichman Univ, Herzliyya, Israel
[4] Brown Univ, Providence, RI USA
[5] Univ Calif Los Angeles, Los Angeles, CA USA
基金
欧洲研究理事会;
关键词
EFFICIENT;
D O I
10.1007/978-3-031-58740-5_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Common randomness is an essential resource in many applications. However, Cleve (STOC 86) rules out the possibility of tossing a fair coin from scratch in the presence of a dishonest majority. A second-best alternative is a Coin Tossing Extension (CTE) protocol, which uses an "online" oracle that produces a few common random bits to generate many common random-looking bits. We initiate the systematic study of fully-secure CTE, which guarantees output even in the presence of malicious behavior. A fully-secure two-party statistical CTE protocol with black-box simulation was implicit in Hofheinz et al. (Eurocrypt 06), but its round complexity is nearly linear in its output length. The problem of constant-round CTE with superlogarithmic stretch remained open. We prove that statistical CTE with full black-box security and superlogarithmic stretch must have superconstant rounds. In the computational setting we prove that with N >= 2 parties and polynomial stretch: - One round suffices for CTE under subexponential LWE, even with Universally Composable security against adaptive corruptions. - One-round CTE is implied by DDH or the hidden subgroup assumption in class groups, with a short, reusable Uniform Random String, and by DCR and QR, with a reusable Structured Reference String. - One-way functions imply CTE with O(N) rounds, and thus constant-round CTE for any constant number of parties. Such results were not previously known even in the two-party setting with standalone, static security. We also extend one-round CTE to sample from any efficient distribution, via strong assumptions including IO. Our one-round CTE protocols can be interpreted as explainable variants of classical randomness extractors, wherein a (short) seed and a source instance can be efficiently reverse-sampled given a random output. Such explainable extractors may be of independent interest.
引用
收藏
页码:122 / 154
页数:33
相关论文
共 21 条
  • [1] Parallel coin-tossing and constant-round secure two-party computation
    Lindell, Y
    JOURNAL OF CRYPTOLOGY, 2003, 16 (03) : 143 - 184
  • [2] Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation
    Journal of Cryptology, 2003, 16 : 143 - 184
  • [3] Constant-round coin-tossing with a man in the middle or realizing the shared random string model
    Barak, B
    FOCS 2002: 43RD ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2002, : 345 - 355
  • [4] Constant-Round MPC with Fairness and Guarantee of Output Delivery
    Gordon, S. Dov
    Liu, Feng-Hao
    Shi, Elaine
    ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 : 63 - 82
  • [5] Constant-round linear-broadcast secure computation with penalties
    Nakai, Takeshi
    Shinagawa, Kazumasa
    THEORETICAL COMPUTER SCIENCE, 2023, 959
  • [6] Constant-Round Client-Aided Secure Comparison Protocol
    Morita, Hiraku
    Attrapadung, Nuttapong
    Teruya, Tadanori
    Ohata, Satsuya
    Nuida, Koji
    Hanaoka, Goichiro
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 395 - 415
  • [7] On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs
    Deng, Yi
    Garay, Juan
    Ling, San
    Wang, Huaxiong
    Yung, Moti
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 2016, 9841 : 237 - 253
  • [8] Perfect constant-round secure computation via perfect randomizing polynomials
    Ishai, Y
    Kushilevitz, E
    AUTOMATA, LANGUAGES AND PROGRAMMING, 2002, 2380 : 244 - 256
  • [9] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Carmit Hazay
    Avishay Yanai
    Journal of Cryptology, 2019, 32 : 1144 - 1199
  • [10] Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
    Hazay, Carmit
    Yanai, Avishay
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 521 - 553