A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation

被引:44
作者
Asharov, Gilad [1 ,3 ,4 ]
Lindell, Yehuda [2 ,4 ]
机构
[1] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, Jerusalem, Israel
[2] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
[3] Hebrew Univ Jerusalem, Sch Comp Sci & Engn, Jerusalem, Israel
[4] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
基金
欧洲研究理事会; 以色列科学基金会;
关键词
Multiparty computation; Perfect security; BGW; Cryptographic protocols;
D O I
10.1007/s00145-015-9214-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the setting of secure multiparty computation, a set of n parties with private inputs wish to jointly compute some functionality of their inputs. One of the most fundamental results of secure computation was presented by Ben-Or, Goldwasser, and Wigderson (BGW) in 1988. They demonstrated that any n-party functionality can be computed with perfect security, in the private channels model. When the adversary is semi-honest, this holds as long as parties are corrupted, and when the adversary is malicious, this holds as long as parties are corrupted. Unfortunately, a full proof of these results was never published. In this paper, we remedy this situation and provide a full proof of security of the BGW protocol. This includes a full description of the protocol for the malicious setting, including the construction of a new subprotocol for the perfect multiplication protocol that seems necessary for the case of n/4 <= t < n/3.
引用
收藏
页码:58 / 151
页数:94
相关论文
共 34 条
  • [1] [Anonymous], 1990, LNCS
  • [2] [Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
  • [3] Asharov G., 2011, IACR CRYPTOL EPRINT, V2011, P136
  • [4] Asharov G, 2011, LECT NOTES COMPUT SC, V6841, P240, DOI 10.1007/978-3-642-22792-9_14
  • [5] BEAVER D, 1990, LECT NOTES COMPUT SC, V435, P560
  • [6] Beaver D., 1992, CRYPTO, V576, P377, DOI DOI 10.1007/3-540-46766-1
  • [7] Beerliová-Trubíniová Z, 2008, LECT NOTES COMPUT SC, V4948, P213, DOI 10.1007/978-3-540-78524-8_13
  • [8] Resilient-optimal interactive consistency in constant time
    Ben-Or, M
    El-Yaniv, R
    [J]. DISTRIBUTED COMPUTING, 2003, 16 (04) : 249 - 262
  • [9] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [10] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145