On Sufficient Oracles for Secure Computation with Identifiable Abort

被引:3
|
作者
Simkin, Mark [1 ]
Siniscalchi, Luisa [2 ,3 ]
Yakoubov, Sophia [2 ]
机构
[1] Ethereum Fdn, Zug, Switzerland
[2] Aarhus Univ, Aarhus, Denmark
[3] Concordium Blockchain Res Ctr, Aarhus, Denmark
基金
欧洲研究理事会;
关键词
secure computation; identifiable abort;
D O I
10.1007/978-3-031-14791-3_22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identifiable abort is the strongest security guarantee that is achievable for secure multi-party computation in the dishonest majority setting. Protocols that achieve this level of security ensure that, in case of an abort, all honest parties agree on the identity of at least one corrupt party who can be held accountable for the abort. It is important to understand what computational primitives must be used to obtain secure computation with identifiable abort. This can be approached by asking which oracles can be used to build perfectly secure computation with identifiable abort. Ishai, Ostrovsky, and Zikas (Crypto 2014) show that an oracle that returns correlated randomness to all n parties is sufficient; however, they leave open the question of whether oracles that return output to fewer than n parties can be used. In this work, we show that for t <= n-2 corruptions, oracles that return output to n - 1 parties are sufficient to obtain information-theoretically secure computation with identifiable abort. Using our construction recursively, we see that for t <= n - 1 - 2 and l is an element of O(1), oracles that return output to n - l - 1 parties are sufficient. For our construction, we introduce a new kind of secret sharing scheme which we call unanimously identifiable secret sharing with public and private shares (UISSwPPS). In a UISSwPPS scheme, each share holder is given a public and a private share. Only the public shares are necessary for reconstruction, and the knowledge of a private share additionally enables the identification of at least one party who provided an incorrect share in case reconstruction fails. The important new property of UISSwPPS is that, even given all the public shares, an adversary should not be able to come up with a different public share that causes reconstruction of an incorrect message, or that avoids the identification of a cheater if reconstruction fails.
引用
收藏
页码:494 / 515
页数:22
相关论文
共 50 条
  • [31] Provably secure threshold signature schemes without random oracles
    State Key Laboratory of Information Security, Graduate University, Chinese Academy of Sciences, Beijing 100039, China
    Jisuanji Xuebao, 2006, 9 (1636-1640):
  • [33] Secure Multi Party Learning: From Secure Computation to Secure Learning
    Han W.-L.
    Song L.-S.
    Ruan W.-Q.
    Lin G.-P.
    Wang Z.-X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (07): : 1494 - 1512
  • [34] Efficient edge-skeleton computation for polytopes defined by oracles
    Emiris, Ioannis Z.
    Fisikopoulos, Vissarion
    Gaertner, Bernd
    JOURNAL OF SYMBOLIC COMPUTATION, 2016, 73 : 139 - 152
  • [35] Secure Multiparty Computation Using Secure Virtual Machines
    Miladinovic, Danko
    Milakovic, Adrian
    Vukasovic, Maja
    Stanisavljevic, Zarko
    Vuletic, Pavle
    ELECTRONICS, 2024, 13 (05)
  • [36] Foundations of Programmable Secure Computation
    Laur, Sven
    Pullonen-Raudvere, Pille
    CRYPTOGRAPHY, 2021, 5 (03)
  • [37] Secure computation for data privacy
    Singh, Meena
    Saxena, Ashutosh
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 58 - 62
  • [38] Secure Multiparty Multisets Computation
    Pan, Jiahao
    Dou, Jiawei
    International Journal of Network Security, 2023, 25 (03) : 425 - 430
  • [39] Secure Computation for Big Data
    Malkin, Tal
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 355 - 355
  • [40] NECESSARY AND SUFFICIENT CONDITIONS FOR QUANTUM COMPUTATION
    LLOYD, S
    JOURNAL OF MODERN OPTICS, 1994, 41 (12) : 2503 - 2520