TY - JOUR
T1 - Network Agnostic Perfectly Secure Multiparty Computation Against General Adversaries
AU - Appan, Ananya
AU - Chandramouli, Anirudh
AU - Choudhury, Ashish
N1 - Publisher Copyright:
© 1963-2012 IEEE.
PY - 2024
Y1 - 2024
N2 - In this work, we initiate the study of network-agnostic perfectly-secure multi-party computation (MPC) against general (non-threshold) adversaries, where the corruption capacity of the adversary is specified through an adversary structure, which is a set of potentially corrupt subsets of parties. Known MPC protocols are designed either assuming a synchronous network where every sent message is guaranteed to be delivered within some known time or assuming an asynchronous network where no timing assumptions are made and every sent message is eventually delivered. Perfectly-secure MPC protocols in the synchronous network can be designed as long as the underlying adversary structure satisfies the Q(3) condition, meaning that the union of no three subsets from the adversary structure covers the entire set of parties. On the other hand, perfectly-secure MPC protocols in the asynchronous network can be designed only against Q(4) adversary structures, meaning that the union of no four subsets from the adversary structure covers the entire set of parties. A natural question is whether a single MPC protocol exists, which remains secure even if the parties are unaware of the network conditions at execution time. That is, if the synchrony is satisfied throughout the protocol execution then the protocol should be secure against any Q(3) adversary structure. However, even if any synchrony assumption is violated during the execution, the protocol should still be secure against any Q(4) adversary structure. We answer the above question affirmatively. Fix any adversary structure Zs and Za satisfying Q(3) and Q(4) conditions respectively, such that Za ⊂ Zs. We show the existence of a network-agnostic perfectly-secure MPC protocol tolerating Zs and Za in synchronous and asynchronous networks respectively as long as the Q(3,1) condition is satisfied, meaning that the union of no three subsets from Zs and one subset from Za covers the entire set of parties. Our result generalizes the result of Appan, Chandramouli and Choudhury (IEEE Transactions on IT, 2023), which presents the only known perfectly-secure network-agnostic MPC protocol against threshold adversaries.
AB - In this work, we initiate the study of network-agnostic perfectly-secure multi-party computation (MPC) against general (non-threshold) adversaries, where the corruption capacity of the adversary is specified through an adversary structure, which is a set of potentially corrupt subsets of parties. Known MPC protocols are designed either assuming a synchronous network where every sent message is guaranteed to be delivered within some known time or assuming an asynchronous network where no timing assumptions are made and every sent message is eventually delivered. Perfectly-secure MPC protocols in the synchronous network can be designed as long as the underlying adversary structure satisfies the Q(3) condition, meaning that the union of no three subsets from the adversary structure covers the entire set of parties. On the other hand, perfectly-secure MPC protocols in the asynchronous network can be designed only against Q(4) adversary structures, meaning that the union of no four subsets from the adversary structure covers the entire set of parties. A natural question is whether a single MPC protocol exists, which remains secure even if the parties are unaware of the network conditions at execution time. That is, if the synchrony is satisfied throughout the protocol execution then the protocol should be secure against any Q(3) adversary structure. However, even if any synchrony assumption is violated during the execution, the protocol should still be secure against any Q(4) adversary structure. We answer the above question affirmatively. Fix any adversary structure Zs and Za satisfying Q(3) and Q(4) conditions respectively, such that Za ⊂ Zs. We show the existence of a network-agnostic perfectly-secure MPC protocol tolerating Zs and Za in synchronous and asynchronous networks respectively as long as the Q(3,1) condition is satisfied, meaning that the union of no three subsets from Zs and one subset from Za covers the entire set of parties. Our result generalizes the result of Appan, Chandramouli and Choudhury (IEEE Transactions on IT, 2023), which presents the only known perfectly-secure network-agnostic MPC protocol against threshold adversaries.
KW - Asynchronous Network
KW - Byzantine Agreement
KW - General Adversary
KW - MPC
KW - Non-threshold adversary
KW - Perfect security
KW - Synchronous Network
KW - Verifiable Secret Sharing
UR - http://www.scopus.com/inward/record.url?scp=85205721220&partnerID=8YFLogxK
U2 - 10.1109/tit.2024.3470513
DO - 10.1109/tit.2024.3470513
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85205721220
SN - 0018-9448
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
ER -