Abstract
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a peer-to-peer network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization: A symmetric n-party functionality can be securely computed facing n/3≤t<n/2 corruptions (i.e., honest majority), if and only if it is (n−2t) -dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output. Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing t≥n/2 corruptions (i.e., no honest majority), if and only if it is 1-dominated and can be securely computed with broadcast. It follows that, in case a third of the parties might be corrupted, broadcast is necessary for securely computing non-dominated functionalities (in which “small” subsets of the inputs cannot determine the output), including, as interesting special cases, the Boolean XOR and coin-flipping functionalities.
Original language | English |
---|---|
Title of host publication | Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings |
Editors | Eyal Kushilevitz, Tal Malkin |
Publisher | Springer Verlag |
Pages | 596-616 |
Number of pages | 21 |
ISBN (Print) | 9783662490952 |
DOIs | |
State | Published - 2016 |
Event | 13th International Conference on Theory of Cryptography, TCC 2016 - Tel Aviv, Israel Duration: 10 Jan 2016 → 13 Jan 2016 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 9562 |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 13th International Conference on Theory of Cryptography, TCC 2016 |
---|---|
Country/Territory | Israel |
City | Tel Aviv |
Period | 10/01/16 → 13/01/16 |
Bibliographical note
Publisher Copyright:© International Association for Cryptologic Research 2016.
Funding
E. Omri—Research supported by ISF grant 544/13. I. Haitner—Research supported by ERC starting grant 638121, ISF grant 1076/11, I-CORE grant 4/11, BSF grant 2010196, and Check Point Institute for Information Security. R. Cohen—Work supported by the israel science foundation (grant No. 189/11), the Ministry of Science, Technology and Space and by the National Cyber Bureau of Israel.
Funders | Funder number |
---|---|
Check Point Institute for Information Security | |
National Cyber Bureau of Israel | |
Horizon 2020 Framework Programme | 638121 |
European Commission | |
Ministry of Science, Technology and Space | |
United States-Israel Binational Science Foundation | 2010196 |
Israel Science Foundation | 189/11, 544/13, 1076/11 |
Keywords
- Broadcast
- Coin flipping
- Fairness
- Impossibility result
- Multiparty computation
- Point-to-point communication