A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation

被引:46
作者
Asharov, Gilad [1 ,3 ,4 ]
Lindell, Yehuda [2 ,4 ]
机构
[1] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, Jerusalem, Israel
[2] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
[3] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, Jerusalem, Israel
[4] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
基金
欧洲研究理事会; 以色列科学基金会;
关键词
Multiparty computation; Perfect security; BGW; Cryptographic protocols;
D O I
10.1007/s00145-015-9214-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the setting of secure multiparty computation, a set of n parties with private inputs wish to jointly compute some functionality of their inputs. One of the most fundamental results of secure computation was presented by Ben-Or, Goldwasser, and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with perfect security, in the private channels model. When the adversary is semi-honest, this holds as long as parties are corrupted, and when the adversary is malicious, this holds as long as parties are corrupted. Unfortunately, a full proof of these results was never published. In this paper, we remedy this situation and provide a full proof of security of the BGW protocol. This includes a full description of the protocol for the malicious setting, including the construction of a new subprotocol for the perfect multiplication protocol that seems necessary for the case of n/4 <= t < n/3.
引用
收藏
页码:58 / 151
页数:94
相关论文
共 34 条
[1]  
[Anonymous], 1990, LNCS
[2]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[3]  
Asharov G., 2011, IACR CRYPTOL EPRINT, V2011, P136
[4]  
Asharov G, 2011, LECT NOTES COMPUT SC, V6841, P240, DOI 10.1007/978-3-642-22792-9_14
[5]  
BEAVER D, 1990, LECT NOTES COMPUT SC, V435, P560
[6]  
Beaver D., 1992, CRYPTO, V576, P377, DOI DOI 10.1007/3-540-46766-1
[7]  
Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
[8]   Resilient-optimal interactive consistency in constant time [J].
Ben-Or, M ;
El-Yaniv, R .
DISTRIBUTED COMPUTING, 2003, 16 (04) :249-262
[9]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[10]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145