On Sufficient Oracles for Secure Computation with Identifiable Abort

被引:3
|
作者
Simkin, Mark [1 ]
Siniscalchi, Luisa [2 ,3 ]
Yakoubov, Sophia [2 ]
机构
[1] Ethereum Fdn, Zug, Switzerland
[2] Aarhus Univ, Aarhus, Denmark
[3] Concordium Blockchain Res Ctr, Aarhus, Denmark
基金
欧洲研究理事会;
关键词
secure computation; identifiable abort;
D O I
10.1007/978-3-031-14791-3_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identifiable abort is the strongest security guarantee that is achievable for secure multi-party computation in the dishonest majority setting. Protocols that achieve this level of security ensure that, in case of an abort, all honest parties agree on the identity of at least one corrupt party who can be held accountable for the abort. It is important to understand what computational primitives must be used to obtain secure computation with identifiable abort. This can be approached by asking which oracles can be used to build perfectly secure computation with identifiable abort. Ishai, Ostrovsky, and Zikas (Crypto 2014) show that an oracle that returns correlated randomness to all n parties is sufficient; however, they leave open the question of whether oracles that return output to fewer than n parties can be used. In this work, we show that for t <= n-2 corruptions, oracles that return output to n - 1 parties are sufficient to obtain information-theoretically secure computation with identifiable abort. Using our construction recursively, we see that for t <= n - 1 - 2 and l is an element of O(1), oracles that return output to n - l - 1 parties are sufficient. For our construction, we introduce a new kind of secret sharing scheme which we call unanimously identifiable secret sharing with public and private shares (UISSwPPS). In a UISSwPPS scheme, each share holder is given a public and a private share. Only the public shares are necessary for reconstruction, and the knowledge of a private share additionally enables the identification of at least one party who provided an incorrect share in case reconstruction fails. The important new property of UISSwPPS is that, even given all the public shares, an adversary should not be able to come up with a different public share that causes reconstruction of an incorrect message, or that avoids the identification of a cheater if reconstruction fails.
引用
收藏
页码:494 / 515
页数:22
相关论文
共 50 条
  • [1] Efficient Secure Multiparty Computation with Identifiable Abort
    Baum, Carsten
    Orsini, Emmanuela
    Scholl, Peter
    THEORY OF CRYPTOGRAPHY, TCC 2016-B, PT I, 2016, 9985 : 461 - 490
  • [2] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [3] Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort
    Alon, Bar
    Chung, Hao
    Chung, Kai-Min
    Huang, Mi-Ying
    Lee, Yi
    Shen, Yu-Ching
    ADVANCES IN CRYPTOLOGY (CRYPTO 2021), PT I, 2021, 12825 : 436 - 466
  • [4] Round-Optimal Multi-party Computation with Identifiable Abort
    Ciampi, Michele
    Ravi, Divya
    Siniscalchi, Luisa
    Waldner, Hendrik
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT I, 2022, 13275 : 335 - 364
  • [5] Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort
    Chung, Kai-Min
    Huang, Mi-Ying
    Tang, Er-Cheng
    Zhang, Jiapeng
    ADVANCES IN CRYPTOLOGY, PT VI, EUROCRYPT 2024, 2024, 14656 : 119 - 148
  • [6] Best-of-Both-Worlds Multiparty Quantum Computation with Publicly Verifiable Identifiable Abort
    Chung, Kai-Min
    Huang, Mi-Ying
    Tang, Er-Cheng
    Zhang, Jiapeng
    ADVANCES IN CRYPTOLOGY, PT VII, EUROCRYPT 2024, 2024, 14657 : 119 - 148
  • [7] Fast Actively Secure Five-Party Computation with Security Beyond Abort
    Byali, Megha
    Hazay, Carmit
    Patra, Arpita
    Singla, Swati
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1573 - 1590
  • [8] A Trustless GQ Multi-signature Scheme with Identifiable Abort
    Cui, Handong
    Yuen, Tsz Hon
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 673 - 693
  • [9] Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs
    Baum, Carsten
    Melissaris, Nikolas
    Rachuri, Rahul
    Scholl, Peter
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT VIII, 2024, 14927 : 454 - 488
  • [10] Oracles and queries that are sufficient for exact learning
    Bshouty, NH
    Cleve, R
    Gavalda, R
    Kannan, S
    Tamon, C
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1996, 52 (03) : 421 - 433