Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation
نویسندگان
چکیده
Multi-party fair exchange (MFE) and secure multi-party computation (fair SMPC) are under-studied fields of research, with practical importance. In particular, we consider MFE scenarios where at the end protocol, either every participant receives other participant’s item, or no anything. We analyze case a trusted third party (TTP) is optimistically available, although emphasize that trust put on TTP only regarding fairness , our protocols preserve privacy exchanged items against TTP. SMPC case, prove malicious can harm fairness, but not security . construct an asymptotically optimal protocol requires constant number rounds (in comparison to linear) O(n 2 ) messages cubic), n participating parties. enable parties efficiently any item be into verifiable encryption (e.g., signatures contract). show how apply this top achieve very little overhead (independent circuit size). then generalize handle topology (participants arbitrary participants). Our guarantees in its strongest sense: even if all n-1 participants colluding each other, still guaranteed.
منابع مشابه
Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation
Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are under-studied fields of research, with practical importance. We examine MFE scenarios where every participant has some item, and at the end of the protocol, either every participant receives every other participant’s item, or no participant receives anything. This is a particularly hard scenario, even though...
متن کاملFair Secure Two-Party Computation
We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any substantial advantage by terminating the protocol prematurely. The transformation adds additional steps before and after the execution of the original protocol, but does not change it otherwise, and does not use a trusted third party. It is based on the use of g...
متن کاملEfficient Secure Multi-party Computation
Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...
متن کاملEfficiently Making Secure Two-Party Computation Fair
Secure two-party computation cannot be fair against malicious adversaries, unless a trusted third party (TTP) or a gradual-release type super-constant round protocol is employed. Existing optimistic fair two-party computation protocols with constant rounds are either too costly to arbitrate (e.g., the TTP may need to re-do almost the whole computation), or require the use of electronic payments...
متن کاملAn Efficient Protocol for Fair Secure Two-Party Computation
? In the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withstanding semi-honest adversaries, which is based on so-called garbled circuits. Later, several protocols based on garbled circuits covering malicious adversaries have been proposed. Only a few papers, however, discuss the fundamental property of fairness for two-party computation. So far the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM transactions on privacy and security
سال: 2021
ISSN: ['2471-2574', '2471-2566']
DOI: https://doi.org/10.1145/3477530