From Fairness to Full Security in Multiparty Computation

Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem

Research output: Contribution to journalArticlepeer-review

6 Scopus citations

Abstract

In the setting of secure multiparty computation (MPC), a set of mutually distrusting parties wish to jointly compute a function, while guaranteeing the privacy of their inputs and the correctness of the output. An MPC protocol is called fully secure if no adversary can prevent the honest parties from obtaining their outputs. A protocol is called fair if an adversary can prematurely abort the computation, however, only before learning any new information. We present efficient transformations from fair computations to fully secure computations, assuming a constant fraction of honest parties (e.g., 1 % of the parties are honest). Compared to previous transformations that require linear invocations (in the number of parties) of the fair computation, our transformations require super-logarithmic, and sometimes even super-constant, such invocations. The main idea is to delegate the computation to random committees that invoke the fair computation. Apart from the benefit of uplifting security, the reduction in the number of parties is also useful, since only committee members are required to work, whereas the remaining parties simply “listen” to the computation over a broadcast channel. One application of these transformations is a new δ-bias coin-flipping protocol, whose round complexity has a super-logarithmic dependency on the number of parties, improving over the linear-dependency protocol of Beimel, Omri, and Orlov (Crypto 2010). A second application is a new fully secure protocol for computing the Boolean OR function, with a super-constant round complexity, improving over the protocol of Gordon and Katz (TCC 2009) whose round complexity is linear in the number of parties. Finally, we show that our positive results are in a sense optimal, by proving that for some functionalities, a super-constant number of (sequential) invocations of the fair computation is necessary for computing the functionality in a fully secure manner.

Original languageEnglish
Article number4
JournalJournal of Cryptology
Volume35
Issue number1
DOIs
StatePublished - Jan 2022
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2021, International Association for Cryptologic Research.

Funding

A preliminary version of this work appeared at SCN 2018 []. R. Cohen: Research supported in part by NSF Grant No. 2055568. Most of this work was done while the author was a post-doctoral researcher at Tel Aviv University, supported by ERC starting Grant 638121. I. Haitner: Member of the Check Point Institute for Information Security. Research supported by ERC starting Grant 638121 and the Israel Science Foundation Grant 666/19. E. Omri: Research supported by ISF Grant 152/17, and by the Ariel Cyber Innovation Center in conjunction with the Israel National Cyber directorate in the Prime Minister’s Office. L. Rotem: Supported by the Adams Fellowship Program of the Israel Academy of Sciences and Humanities, the European Union’s Horizon 2020 Framework Program (H2020) via an ERC Grant (Grant No. 714253), and the Israel Science Foundation (Grant No. 483/13)

FundersFunder number
European Union’s Horizon 2020 Framework Program
National Science Foundation2055568
Horizon 2020 Framework Programme714253, 483/13, 638121
European Commission
Israel Academy of Sciences and Humanities
Israel Science Foundation666/19, 152/17

    Keywords

    • Fairness
    • Identifiable abort
    • Multiparty computation
    • Security reductions

    Fingerprint

    Dive into the research topics of 'From Fairness to Full Security in Multiparty Computation'. Together they form a unique fingerprint.

    Cite this