Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations

نویسندگان

  • Manoj Prabhakaran
  • Mike Rosulek
چکیده

We develop new tools to study the relative complexities of secure multi-party computation tasks in the Universal Composition framework. When one task can be securely realized using another task as a black-box, we interpret this as a qualitative, complexity-theoretic reduction between the two tasks. Virtually all previous characterizations of MPC functionalities, in the UC model or otherwise, focus exclusively on secure function evaluation. In comparison, the tools we develop do not rely on any special internal structure of the functionality, thus applying to functionalities with arbitrary behavior. Our tools additionally apply uniformly to both the PPT and unbounded computation models. Our first main tool is an exact characterization of realizability in the UC framework with respect to a large class of communication channel functionalities. Using this characterization, we can rederive all previouslyknown impossibility results as immediate and simple corollaries. We also complete the combinatorial characterization of 2-party secure function evaluation initiated by [10] and partially extend the combinatorial conditions to the multi-party setting. Our second main tool allows us to translate complexity separations in simpler MPC settings (such as the honest-but-curious corruption model) to the standard (malicious) setting. Using this tool, we demonstrate the existence of functionalities which are neither realizable nor complete, in the unbounded computation model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mohammad Mahmoody

Cryptography is the science of secure computation and communication. The scope of cryptosystems, nowadays, ranges from private-key encryption and authentication to more complex systems such as publickey encryption, electronic voting, secure multi-party computation on large data sets, etc. My specialization is in foundations of cryptography, a field that aims at designing cryptographic protocols...

متن کامل

Computationally Sound Abstraction and Verification of Secure Multi-party Computations (Extended Abstract)

While Dolev-Yao models traditionally comprise only noninteractive cryptographic operations (i.e., cryptographic operations that produce a single message and do not involve any form of communication, such as encryption and digital signatures), recent cryptographic protocols rely on more sophisticated interactive primitives (i.e., cryptographic operations that involve several message exchanges am...

متن کامل

Round-Optimal Secure Multi-Party Computation

Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of their private inputs where security should hold in the presence of a malicious adversary that can corrupt any number of parties. Despite extensive research, the precise round complexity of this “standard-bearer” cryptographic primitive is unk...

متن کامل

Efficient Multi-Party Computation Secure Against a Faulty Minority

We consider the communication complexity of secure multi-party computation protocols in the cryptographic model. In this model, the adversary is allowed to corrupt up to t of the n players, for any t < n/2. The most efficient protocol known for this model requires Ω(cnκ) bits of communication for securely evaluating a circuit of size c, where κ denotes a security parameter [CDN01]. We present a...

متن کامل

Mobile Commerce: Secure Multi-party Computation & Financial Cryptography

The basic objective of this work is to construct an efficient and secure mechanism for mobile commerce applying the concept of financial cryptography and secure multi-party computation. The mechanism (MCM) is defined by various types of elements: a group of agents or players, actions, a finite set of inputs of each agent, a finite set of outcomes as defined by output function, a set of objectiv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008