Adaptively secure computation with partial erasures

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Adaptive security is a strong corruption model that captures "hacking" attacks where an external attacker breaks into parties' machines in the midst of a protocol execution. There are two types of adaptively-secure protocols: Adaptive with erasures and adaptive without erasures. Achieving adaptivity without erasures is preferable, since secure erasures are not always trivial. However, it seems far harder. We introduce a new model of adaptive security called adaptive security with partial erasures that allows erasures, but only assumes them in a minimal sense. Specifically, if all parties are corrupted then security holds as long as any single party successfully erases. In addition, security holds if any proper subset of the parties is corrupted without erasures. We initiate a theoretical study of this new notion and demonstrate that secure computation in this setting is as efficient as static secure computation. In addition, we study the relations between semi-adaptive security [GWZ09], adaptive security with partial erasures, and adaptive security without any erasures. We prove that the existence of semi-adaptive OT implies secure computation in all these settings.

Original languageEnglish
Title of host publicationPODC 2015 - Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
PublisherAssociation for Computing Machinery
Pages291-300
Number of pages10
ISBN (Electronic)9781450336178
DOIs
StatePublished - 21 Jul 2015
EventACM Symposium on Principles of Distributed Computing, PODC 2015 - Donostia-San Sebastian, Spain
Duration: 21 Jul 201523 Jul 2015

Publication series

NameProceedings of the Annual ACM Symposium on Principles of Distributed Computing
Volume2015-July

Conference

ConferenceACM Symposium on Principles of Distributed Computing, PODC 2015
Country/TerritorySpain
CityDonostia-San Sebastian
Period21/07/1523/07/15

Bibliographical note

Publisher Copyright:
© Copyright 2015 ACM.

Keywords

  • Adaptive security
  • Erasure
  • Non-committing encryption
  • Oblivious transfer
  • Secure computation

Fingerprint

Dive into the research topics of 'Adaptively secure computation with partial erasures'. Together they form a unique fingerprint.

Cite this