Adaptively Secure Multi-Party Computation with Dishonest Majority

被引:0
|
作者
Garg, Sanjam [1 ]
Sahai, Amit [1 ]
机构
[1] Univ Calif Los Angeles, Los Angeles, CA USA
来源
关键词
BLACK-BOX CONSTRUCTIONS; OBLIVIOUS TRANSFER; 2-PARTY COMPUTATION; PROTOCOLS; SIMULATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Adaptively secure multiparty computation is an essential and fundamental notion in cryptography. In this work we focus on the basic question of constructing a multiparty computation protocol secure against a malicious, adaptive adversary in the stand-alone setting without assuming an honest majority, in the plain model. It has been believed that this question can be resolved by composing known protocols from the literature. We show that in fact, this belief is fundamentally mistaken. In particular, we show: Round inefficiency is unavoidable when using black-box simulation: There does not exist any o(n/logn) round protocol that adaptively securely realizes a (natural) n-party functionality with a black-box simulator. Note that most previously known protocols in the adaptive security setting relied on black-box simulators. A constant round protocol using non-black-box simulation: We construct a constant round adaptively secure multiparty computation protocol in a setting without honest majority that makes crucial use of non-black box techniques. Taken together, these results give the first resolution to the question of adaptively secure multiparty computation protocols with a malicious dishonest majority in the plain model, open since the first formal treatment of adaptive security for multiparty computation in 1996.
引用
收藏
页码:105 / 123
页数:19
相关论文
共 50 条
  • [1] Secure Multi-party Quantum Computation with a Dishonest Majority
    Dulek, Yfke
    Grilo, Alex B.
    Jeffery, Stacey
    Majenz, Christian
    Schaffner, Christian
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT III, 2020, 12107 : 729 - 758
  • [2] Round efficiency of multi-party computation with a dishonest majority
    Katz, J
    Ostrovsky, R
    Smith, A
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 578 - 595
  • [3] Dishonest Majority Multi-Party Computation for Binary Circuits
    Larraia, Enrique
    Orsini, Emmanuela
    Smart, Nigel P.
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 495 - 512
  • [4] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [5] Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)
    Damgard, Ivan
    Polychroniadou, Antigoni
    Rao, Vanishree
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT II, 2016, 9615 : 208 - 233
  • [6] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [7] Unconditional byzantine agreement and multi-party computation secure against dishonest minorities from scratch
    Fitzi, M
    Gisin, N
    Maurer, U
    von Rotz, O
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2002, PROCEEDINGS, 2002, 2332 : 482 - 501
  • [8] Secure multi-party computation made simple
    Maurer, U
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [9] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287
  • [10] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)