Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation

نویسندگان

چکیده

Multi-party fair exchange (MFE) and secure multi-party computation (fair SMPC) are under-studied fields of research, with practical importance. In particular, we consider MFE scenarios where at the end protocol, either every participant receives other participant’s item, or no anything. We analyze case a trusted third party (TTP) is optimistically available, although emphasize that trust put on TTP only regarding fairness , our protocols preserve privacy exchanged items against TTP. SMPC case, prove malicious can harm fairness, but not security . construct an asymptotically optimal protocol requires constant number rounds (in comparison to linear) O(n 2 ) messages cubic), n participating parties. enable parties efficiently any item be into verifiable encryption (e.g., signatures contract). show how apply this top achieve very little overhead (independent circuit size). then generalize handle topology (participants arbitrary participants). Our guarantees in its strongest sense: even if all n-1 participants colluding each other, still guaranteed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation

Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are under-studied fields of research, with practical importance. We examine MFE scenarios where every participant has some item, and at the end of the protocol, either every participant receives every other participant’s item, or no participant receives anything. This is a particularly hard scenario, even though...

متن کامل

Fair Secure Two-Party Computation

We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any substantial advantage by terminating the protocol prematurely. The transformation adds additional steps before and after the execution of the original protocol, but does not change it otherwise, and does not use a trusted third party. It is based on the use of g...

متن کامل

Efficient Secure Multi-party Computation

Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...

متن کامل

Efficiently Making Secure Two-Party Computation Fair

Secure two-party computation cannot be fair against malicious adversaries, unless a trusted third party (TTP) or a gradual-release type super-constant round protocol is employed. Existing optimistic fair two-party computation protocols with constant rounds are either too costly to arbitrate (e.g., the TTP may need to re-do almost the whole computation), or require the use of electronic payments...

متن کامل

An Efficient Protocol for Fair Secure Two-Party Computation

? In the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withstanding semi-honest adversaries, which is based on so-called garbled circuits. Later, several protocols based on garbled circuits covering malicious adversaries have been proposed. Only a few papers, however, discuss the fundamental property of fairness for two-party computation. So far the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM transactions on privacy and security

سال: 2021

ISSN: ['2471-2574', '2471-2566']

DOI: https://doi.org/10.1145/3477530