Fully Simulatable Multiparty Computation
نویسندگان
چکیده
We introduce and realize the notion of fully simulatable multiparty computation. Unlike any of the previous models, our notion simultaneously enjoys the following features: • Main feature: The simulator does not have any extra power over the “real-life” adversary. In particular, it cannot program any public parameters or run in super-polynomial time. Thus, our implementation is fully deniable for tasks such as authentication and zero-knowledge (unlike the previous solutions in the common reference string model). • Universal composability (in particular, straight-line simulation). • No PKI (although there exists one “non-programmable” public key; see below). • Adaptive security. We remark that it might seem impossible to realize all (or even the main) of the above features, even for relatively simple tasks such as zero-knowledge [10]. The way we overcome this apparent contradiction is by introducing a polynomial-time, fully off-line trusted party T to our model. T publishes a single certified public key pk and never has to participate again in any of the protocols. However, any party P has an option of contacting T and requesting an identity-based secret key skP . We stress, though, that no honest party actually needs to (and correspondingly will not) contact T , while the security will hold even against corrupted parties who do contact T . We believe that the addition of fully off-line T is a minimal and very realistic way to overcome the impossibility results in the “standard” model. Additionally, the introduction of T could naturally support other desirable properties impossible in the standard model (such as optimistic fairness with faulty majority). The main building block of our construction is the notion of identity-based chameleon hash functions [1]. We give an elegant, generic construction of such hash functions from any signature scheme possessing a certain Σ-protocol. By showing several efficient implementations of such protocols, we give the first constructions of identity-based chameleon hash functions without random oracles, which is of independent interest.
منابع مشابه
On the Impossibility of Sender-Deniable Public Key Encryption
The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, 1997). Deniable encryption is a regular public key encryption scheme with the added feature that after running the protocol honestly and transmitting a message m, both Sender and Receiver may produce random coins showing that the transmitted ciphertext was an encryption of any message m′ in the message space. D...
متن کاملMultiparty Computation, an Introduction
These lecture notes introduce the notion of secure multiparty computation. We introduce some concepts necessary to define what it means for a multiparty protocol to be secure, and survey some known general results that describe when secure multiparty computation is possible. We then look at some general techniques for building secure multiparty protocols, including protocols for commitment and ...
متن کاملSecure Multiparty Computation
A function is private if there exists a protocol that is secure; that is, no party can learn any additional information about the other parties’ inputs other than what follows from their own input and the function’s output. Previous studies have investigated multiparty computation with broadcast communication, but broadcast communication does not fully capture all secure multiparty protocols. W...
متن کاملCommuting Quantum Circuits with Few Outputs are Unlikely to be Classically Simulatable
We study the classical simulatability of commuting quantum circuits with n input qubits and O(log n) output qubits, where a quantum circuit is classically simulatable if its output probability distribution can be sampled up to an exponentially small additive error in classical polynomial time. First, we show that there exists a commuting quantum circuit that is not classically simulatable unles...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004