Unconditionally Secure Multi-party Computation from Weak Primitives

نویسندگان

  • Stefan Wolf
  • Jürg Wullschleger
چکیده

Let us assume that old friends meet again, after a long time. Both have become millionaires since that last time they met would like to find out who has been more successful in making money. However, they don't want the other to find out how much they earn, they both only want to get to know one bit of information. This problem is an example of secure multi-party computation, which has been introduced by Yao [46], where different parties want to collaborate in a secure way in order to achieve a common goal, however they mutually distrust each other and do not want to make use of a trusted third party, i.e., a distinct player that would carry out the computation for them. Note that, opposed to many other problem in cryptography, the players are not apriori good or bad. In this chapter we will only look at special case of secure function evaluation , where every party holds an input to a function, and the output should be computed in a way such that no party has to reveal unnecessary information about her input. A complete solution for this problem with respect to computational security was given in [27]. In [4, 13], it was shown that in a model with only pairwise secure channels, MPC unconditionally secure against an active adversary is achievable if and only if t < n/3 players are corrupted. However, if the players are provided additionally In [3, 39] it was shown that this bound can be improved to t < n/2, assuming that global broadcast channels are additionally given—and this bound was shown tight. A protocol more efficient than those in [3, 39] was given in [15]. For the case where n = 2, there cannot exist a protocol that is unconditionally secure, as we will see later. However, if a primitive called oblivious transfer is assumed, then any function can be calculated unconditionally secure, this was shown by Kilian [31]. In this work we will present several protocols that implement the basic primitives bit-commitment, oblivious transfer and broadcast based on noisy resources, such as noisy channels and correlated randomness.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bit Commitment from Non-Local Correlations

Central cryptographic functionalities such as encryption, authentication, or secure two-party computation cannot be realized in an information-theoretically secure way from scratch. This serves as a motivation to study what (possibly weak) primitives they can be based on. We consider as such starting points general two-party input-output systems that do not allow for message transmission, and s...

متن کامل

Statistical Impossibility Results for Oblivious Transfer Reductions

Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditionally secure way, but there are many reductions of OT to other variants of OT, as well as other primitives such as noisy channels. It is important to know how efficient such unconditionally secure reductions can be in pr...

متن کامل

Oblivious-Transfer Amplification

Oblivious transfer (OT) is a primitive of paramount importance in cryptography or, more precisely, twoand multi-party computation due to its universality. On the other hand, OT cannot be achieved in an unconditionally secure way for both parties from scratch. Therefore, it is a natural question what information-theoretic primitives or computational assumptions OT can be based on. The results in...

متن کامل

Unconditionally Secure Multi-Party Computation

The most general type of multi-party computation involves n participants. Participant i supplies private data xi and obtains an output function fi(x1, . . . , xn). The computation is said to be unconditionally secure if each participant can verify, with probability arbitrarily close to one, that every other participant obtains arbitrarily little information beyond their agreed output fi. We giv...

متن کامل

Efficient Secure Multi-party Computation

Since the introduction of secure multi-party computation, all proposed protocols that provide security against cheating players suffer from very high communication complexities. The most efficient unconditionally secure protocols among n players, tolerating cheating by up to t < n/3 of them, require communicating O(n6) field elements for each multiplication of two elements, even if only one pla...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006