A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation

被引:0
|
作者
Gilad Asharov
Yehuda Lindell
机构
[1] Hebrew University of Jerusalem,School of Computer Science and Engineering
[2] Bar-Ilan University,Department of Computer Science
来源
Journal of Cryptology | 2017年 / 30卷
关键词
Multiparty computation; Perfect security; BGW ; Cryptographic protocols;
D O I
暂无
中图分类号
学科分类号
摘要
In the setting of secure multiparty computation, a set of n parties with private inputs wish to jointly compute some functionality of their inputs. One of the most fundamental results of secure computation was presented by Ben-Or, Goldwasser, and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with perfect security, in the private channels model. When the adversary is semi-honest, this holds as long as t<n/2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t<n/2$$\end{document} parties are corrupted, and when the adversary is malicious, this holds as long as t<n/3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t<n/3$$\end{document} parties are corrupted. Unfortunately, a full proof of these results was never published. In this paper, we remedy this situation and provide a full proof of security of the BGW protocol. This includes a full description of the protocol for the malicious setting, including the construction of a new subprotocol for the perfect multiplication protocol that seems necessary for the case of n/4≤t<n/3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n/4\le t<n/3$$\end{document}.
引用
收藏
页码:58 / 151
页数:93
相关论文
共 50 条
  • [21] Scalable secure multiparty computation
    Damgard, Ivan
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 501 - 520
  • [22] General quantum secure multiparty computation protocol for simultaneous summation and multiplication
    Li, Fulin
    Luo, Mei
    Zhu, Shixin
    Pang, Binbin
    PHYSICA SCRIPTA, 2024, 99 (01)
  • [23] Secure multiparty computation protocol based on homomorphic encryption and its application in blockchain
    Bao, Haijun
    Yuan, Minghao
    Deng, Haitao
    Xu, Jiang
    Zhao, Yekang
    HELIYON, 2024, 10 (14)
  • [24] AI-Powered Blockchain - A Decentralized Secure Multiparty Computation Protocol for IoV
    Raja, Gunasekaran
    Manaswini, Yelisetty
    Vivekanandan, Gaayathri Devi
    Sampath, Harish
    Dev, Kapal
    Bashir, Ali Kashif
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 865 - 870
  • [25] Efficient Secure Multiparty Computation Protocol for Sequencing Problem over Insecure Channel
    Sun, Yi
    Wen, Qiaoyan
    Zhang, Yudong
    Zhang, Hua
    Jin, Zhengping
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [26] Better Preprocessing for Secure Multiparty Computation
    Baum, Carsten
    Damgard, Ivan
    Toft, Tomas
    Zakarias, Rasmus
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 327 - 345
  • [27] Absentia: Secure Multiparty Computation on Ethereum
    Demirag, Didem
    Clark, Jeremy
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, 2021, 12676 : 381 - 396
  • [28] Secure Multiparty Computation with Minimal Interaction
    Ishai, Yuval
    Kushilevitz, Eyal
    Paskin-Cherniavsky, Anat
    ADVANCES IN CRYPTOLOGY - CRYPTO 2010, 2010, 6223 : 577 - 594
  • [29] Analysis of Data in Secure Multiparty Computation
    Shaikh, Zulfa
    Puntambekar, D. M.
    Pathak, Pushpa
    Bhati, Dinesh
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 731 - 733
  • [30] Trust Enabled Secure Multiparty Computation
    Dong, Renren
    Kresman, Ray
    2010 14TH INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV 2010), 2010, : 531 - 536