Cryptographic complexity of multi-party computation problems: Classifications and separations

被引:0
|
作者
Prabhakaran, Manoj [1 ]
Rosulek, Mike [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We develop new tools to study the relative complexities of secure multi-party computation tasks in the Universal Composition framework. When one task can be securely realized using another task as a black-box, we interpret this as a qualitative, complexity-theoretic reduction between the two tasks. Virtually all previous characterizations of MPC functionalities, in the UC model or otherwise, focus exclusively on secure function evaluation. In comparison, the tools we develop do not rely on ally special internal structure of the functionality, thus applying to functionalities with arbitrary behavior. Our tools additionally apply uniformly to both the PPT and unbounded computation models. Our first main tool is an exact characterization of realizability in the UC framework with respect to a large class of communication channel functionalities. Using this characterization, we can rederive all previously-known impossibility results as immediate and simple corollaries. We also complete the combinatorial characterization of 2-party secure function evaluation initiated by [12] and partially extend the combinatorial conditions to the multi-party setting. Our second main tool allows us to translate complexity separations in simpler MPC settings (such as the honest-but-curious corruption model) to the standard (malicious) setting. Using this tool; we demonstrate the existence of functionalities which are neither realizable nor complete, in the unbounded computation model.
引用
收藏
页码:262 / 279
页数:18
相关论文
共 50 条
  • [1] Cryptographic asynchronous multi-party computation with optimal resilience
    Hirt, M
    Nielsen, JB
    Przydatek, B
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 322 - 340
  • [2] Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
    Maji, Hemanta K.
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 256 - 273
  • [3] A Cryptographic Look at Multi-Party Channels
    Eugster, Patrick
    Marson, Giorgia Azzurra
    Poettering, Bertram
    [J]. IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 31 - 45
  • [4] Everlasting Multi-party Computation
    Unruh, Dominique
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT II, 2013, 8043 : 380 - 397
  • [5] Everlasting Multi-party Computation
    Unruh, Dominique
    [J]. JOURNAL OF CRYPTOLOGY, 2018, 31 (04) : 965 - 1011
  • [6] Everlasting Multi-party Computation
    Dominique Unruh
    [J]. Journal of Cryptology, 2018, 31 : 965 - 1011
  • [7] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [8] Covert multi-party computation
    Chandran, Nishanth
    Goyal, Vipul
    Ostrovsky, Rafail
    Sahai, Arnit
    [J]. 48TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2007, : 238 - 248
  • [9] A secure multi-party computation solution to intersection problems of sets and rectangles
    LI Shundong
    Department of Computer Science and Technology
    [J]. Progress in Natural Science:Materials International, 2006, (05) : 538 - 545
  • [10] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210