Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation

被引:0
|
作者
Maji, Hemanta K. [1 ]
Prabhakaran, Manoj [1 ]
Rosulek, Mike [1 ]
机构
[1] Univ Illinois, Dept Comp Sci, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both parties wish to securely compute f(x,y). We show several new results classifying the feasibility of securely implementing these functions in several security settings. Namely, we give new alternate chaxacterizations of the functions that have (statistically) secure protocols against passive and active (stan-dalone), computationally unbounded adversaries. We also show a strict, infinite hierarchy of complexity for SSFE functions with respect to universally composable security against unbounded adversaries. That is, there exists a sequence of functions f(1),f(2),... such that there exists a UC-secure protocol for f(i) in the f(j)-hybrid world if and only if i <= j. The main new technical tool that unifies our unrealizability results is a powerful protocol simulation theorem, which may be of independent interest. Essentially, in any adversarial setting (UC, standalone, or passive), f is securely realizable if and only if a very simple (deterministic) "canonical" protocol for f achieves the desired security. Thus, to show that f is unrealizable, one need simply demonstrate a single attack on a single simple protocol.
引用
收藏
页码:256 / 273
页数:18
相关论文
共 50 条
  • [1] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [2] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [3] Cryptographic complexity of multi-party computation problems: Classifications and separations
    Prabhakaran, Manoj
    Rosulek, Mike
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 262 - 279
  • [4] Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
    Alper, Handan Kilinc
    Kupcu, Alptekin
    [J]. ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2022, 25 (01)
  • [5] Protocols for Secure Multi-Party Private Function Evaluation
    Aljumah, Feras
    Soeanu, Andrei
    Liu, Wen Ming
    Debbabi, Mourad
    [J]. 2015 FIRST INTERNATIONAL CONFERENCE ON ANTI-CYBERCRIME (ICACC), 2015, : 106 - 111
  • [6] Information theory and secure multi-party computation
    Maurer, UM
    [J]. 1998 INFORMATION THEORY WORKSHOP - KILLARNEY, IRELAND, 1998, : 152 - 153
  • [7] Secure multi-party computation made simple
    Maurer, U
    [J]. DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 370 - 381
  • [8] Secure multi-party computation over networks
    Nishitani, Y
    Igarashi, Y
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03) : 561 - 569
  • [9] Secure multi-party computation with a quantum manner
    Lu, Changbin
    Miao, Fuyou
    Hou, Junpeng
    Su, Zhaofeng
    Xiong, Yan
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2021, 54 (08)
  • [10] Secure multi-party computation without agreement
    Goldwasser, S
    Lindell, Y
    [J]. JOURNAL OF CRYPTOLOGY, 2005, 18 (03) : 247 - 287