Graceful Degradation in Multi-Party Computation

被引:0
作者
Hirt, Martin [1 ]
Lucas, Christoph [1 ]
Maurer, Ueli [1 ]
Raub, Dominik [2 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[2] Aarhus Univ, Dept Comp Sci, Aarhus, Denmark
来源
INFORMATION THEORETIC SECURITY, (ICITS 2011) | 2011年 / 6673卷
关键词
Multi-party computation; graceful degradation; hybrid security; mixed adversaries; MPC VS. SFE; PRIVACY; CORRECTNESS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way. For this purpose, a fixed set of n parties runs a protocol that tolerates an adversary corrupting a subset of the participating parties, and still preserves certain security guarantees. Most MPC protocols provide security guarantees in an all-or-nothing fashion. In this paper, we provide the first treatment of MPC with graceful degradation of both security and corruptions. First of all, our protocols provide graceful degradation of security, i.e., different security guarantees depending on the actual number of corrupted parties: the more corruptions, the weaker the security guarantee. We consider all security properties generally discussed in the literature (secrecy, correctness, robustness, fairness, and agreement on abort). Furthermore, the protocols provide graceful degradation with respect to the corruption type, by distinguishing fully honest parties, passively corrupted parties, and actively corrupted parties. Security can be maintained against more passive corruptions than is possible for active corruptions. We focus on perfect security, and prove exact bounds for which MPC with graceful degradation of security and corruptions is possible for both threshold and general adversaries. Furthermore, we provide protocols that meet these bounds. This strictly generalizes known results on hybrid security and mixed adversaries.
引用
收藏
页码:163 / 180
页数:18
相关论文
共 23 条
  • [11] Fitzi M, 1998, LECT NOTES COMPUT SC, V1462, P121, DOI 10.1007/BFb0055724
  • [12] Gennaro R., 1998, Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, P101, DOI 10.1145/277697.277716
  • [13] Goldreich O., 1987, P 19 ANN ACM S THEOR, P218, DOI DOI 10.1145/28395.28420
  • [14] Hirt M., 1997, Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, P25, DOI 10.1145/259380.259412
  • [15] Hirt M, 2008, LECT NOTES COMPUT SC, V5350, P1, DOI 10.1007/978-3-540-89255-7_1
  • [16] Ishai Y, 2006, LECT NOTES COMPUT SC, V4117, P483
  • [17] On Achieving the "Best of Both Worlds" in Secure Multiparty Computation
    Katz, Jonathan
    [J]. STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, 2007, : 11 - 20
  • [18] Kilian J., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P316, DOI 10.1145/335305.335342
  • [19] Hybrid-Secure MPC: Trading Information-Theoretic Robustness for Computational Privacy
    Lucas, Christoph
    Raub, Dominik
    Maurer, Ueli
    [J]. PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2010, : 219 - 228
  • [20] Maurer U, 2003, LECT NOTES COMPUT SC, V2576, P14