Abstract
In the setting of secure multiparty computation (MPC), a set of mutually distrusting parties wish to jointly compute a function in a correct and private manner. An MPC protocol is called fully secure if no adversary can prevent the honest parties from obtaining their outputs. A protocol is called fair if an adversary can prematurely abort the computation, however, only before learning any new information. We present highly efficient transformations from fair computations to fully secure computations, assuming the fraction of honest parties is constant (e.g., 1 % of the parties are honest). Compared to previous transformations that require linear invocations (in the number of parties) of the fair computation, our transformations require super-logarithmic, and sometimes even super-constant, such invocations. One application of these transformations is a new δ -bias coin-flipping protocol, whose round complexity has a super-logarithmic dependency on the number of parties, improving over the protocol of Beimel, Omri, and Orlov (Crypto 2010) that has a linear dependency. A second application is a new fully secure protocol for computing the Boolean OR function, with a super-constant round complexity, improving over the protocol of Gordon and Katz (TCC 2009) whose round complexity is linear in the number of parties. Finally, we show that our positive results are in a sense optimal, by proving that for some functionalities, a super-constant number of (sequential) invocations of the fair computation is necessary for computing the functionality in a fully secure manner.
Original language | English |
---|---|
Title of host publication | Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings |
Editors | Dario Catalano, Roberto De Prisco |
Publisher | Springer Verlag |
Pages | 216-234 |
Number of pages | 19 |
ISBN (Print) | 9783319981123 |
DOIs | |
State | Published - 2018 |
Externally published | Yes |
Event | 11th International Conference on Security and Cryptography for Networks, SCN 2018 - Amalfi, Italy Duration: 5 Sep 2018 → 7 Sep 2018 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 11035 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 11th International Conference on Security and Cryptography for Networks, SCN 2018 |
---|---|
Country/Territory | Italy |
City | Amalfi |
Period | 5/09/18 → 7/09/18 |
Bibliographical note
Publisher Copyright:© 2018, Springer Nature Switzerland AG.
Funding
R. Cohen—Supported in part by ERC starting grant 638121, Alfred P. Sloan Foundation Award 996698, NEU Cybersecurity and Privacy Institute, and NSF TWC-1664445. I. Haitner—Member of the Israeli Center of Research Excellence in Algorithms (ICORE) and the Check Point Institute for Information Security. Research supported by ERC starting grant 638121. E. Omri—Research supported by ISF grants 544/13 and 152/17. L. Rotem—Supported by the European Union’s Horizon 2020 Framework Program (H2020) via an ERC Grant (Grant No. 714253) and by the Israel Science Foundation (Grant No. 483/13).
Funders | Funder number |
---|---|
National Science Foundation | TWC-1664445 |
Alfred P. Sloan Foundation | 996698 |
Horizon 2020 Framework Programme | 714253, 638121 |
European Commission | |
Israel Science Foundation | 152/17, 544/13, 483/13 |
Northeastern University |