Secure Multiparty Computation with Partial Fairness
نویسندگان
چکیده
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause moreharm than in an ideal computation where parties give their inputs to a trusted party which returns theoutput of the functionality to all parties. In particular, in the ideal model such computation is fair –all parties get the output. Cleve (STOC 1986) proved that, in general, fairness is not possible withoutan honest majority. To overcome this impossibility, Gordon and Katz (Eurocrypt 2010) suggested arelaxed definition – 1/p-secure computation – which guarantees partial fairness. For two parties, theyconstruct 1/p-secure protocols for functionalities for which the size of either their domain or their rangeis polynomial (in the security parameter). Gordon and Katz ask whether their results can be extended tomultiparty protocols.We study 1/p-secure protocols in the multiparty setting for general functionalities. Our main result isconstructions of 1/p-secure protocols when the number of parties is constant provided that less than 2/3of the parties are corrupt. Our protocols require that either (1) the functionality is deterministic and thesize of the domain is polynomial (in the security parameter), or (2) the functionality can be randomizedand the size of the range is polynomial. If the size of the domain is constant and the functionality isdeterministic, then our protocol is efficient even when the number of parties is O(log log n) (where n isthe security parameter). On the negative side, we show that when the number of parties is super-constant,1/p-secure protocols are not possible when the size of the domain is polynomial. ∗Supported by ISF grant 938/09 and by the Frankel Center for Computer Science.†This research was generously supported by the European Research Council as part of the ERC project “LAST”.‡Supported by ISF grant 938/09 and by the Frankel Center for Computer Science.
منابع مشابه
1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds
A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation, where parties give their inputs to a trusted party which returns the output of the functionality to all parties. In particular, in the ideal model such computation is fair – all parties get the output. Cleve (STOC 1986) proved that, in general, fairness is not...
متن کاملHow to Use Bitcoin to Design Fair Protocols
We study a model of fairness in secure computation in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty. We then show how the Bitcoin network can be used to achieve the above notion of fairness in the two-party as well as the multiparty setting (with a dishonest majority). In particular, we propose new ideal functionalities and pr...
متن کاملپروتکل کارا برای جمع چندسویه امن با قابلیت تکرار
In secure multiparty computation (SMC), a group of users jointly and securely computes a mathematical function on their private inputs, such that the privacy of their private inputs will be preserved. One of the widely used applications of SMC is the secure multiparty summation which securely computes the summation value of the users’ private inputs. In this paper, we consider a secure multipar...
متن کاملLegally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should be carried out in a secure way, meaning that the properties privacy, correctness, independence of inputs, fairness and guaranteed output delivery should all be preserved. Unfortunately, in the case of no honest majori...
متن کاملFair and Efficient Secure Multiparty Computation with Reputation Systems
A reputation system for a set of entities is essentially a list of scores that provides a measure of the reliability of each entity in the set. The score given to an entity can be interpreted (and in the reputation system literature it often is [12]) as the probability that an entity will behave honestly. In this paper, we ask whether or not it is possible to utilize reputation systems for carr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2010 شماره
صفحات -
تاریخ انتشار 2010