Characterization of Secure Multiparty Computation Without Broadcast

被引:9
作者
Cohen, Ran [1 ]
Haitner, Iftach [2 ]
Omri, Eran [3 ]
Rotem, Lior [2 ]
机构
[1] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
[2] Tel Aviv Univ, Sch Comp Sci, IL-69978 Tel Aviv, Israel
[3] Ariel Univ, Dept Comp Sci & Math, Ariel, Israel
来源
THEORY OF CRYPTOGRAPHY, TCC 2016-A, PT I | 2016年 / 9562卷
关键词
Broadcast; Point-to-point communication; Multiparty computation; Coin flipping; Fairness; Impossibility result; BYZANTINE GENERALS PROBLEM; AGREEMENT;
D O I
10.1007/978-3-662-49096-9_25
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a peer-to-peer network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization: - A symmetric n-party functionality can be securely computed facing n/3 <= t < n/2 corruptions (i.e., honest majority), if and only if it is (n - 2t)-dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output. - Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing t >= n/2 corruptions (i.e., no honest majority), if and only if it is 1-dominated and can be securely computed with broadcast. It follows that, in case a third of the parties might be corrupted, broadcast is necessary for securely computing non-dominated functionalities (in which "small" subsets of the inputs cannot determine the output), including, as interesting special cases, the Boolean XOR and coin-flipping functionalities.
引用
收藏
页码:596 / 616
页数:21
相关论文
共 25 条
[1]  
[Anonymous], 2004, FDN CRYPTOGRAPHY BAS
[2]  
[Anonymous], 1981, 1 ANN INT CRYPT C CR
[3]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[4]  
Beimel A, 2010, LECT NOTES COMPUT SC, V6223, P538, DOI 10.1007/978-3-642-14623-7_29
[5]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[6]  
Broder AndreiZ., 1984, FOCS, P157
[7]  
Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214
[8]  
Chor B., 1985, P 26 IEEE S FDN COMP, P383
[9]  
Cleve R., 1986, P 18 ANN ACM S THEOR, P364, DOI DOI 10.1145/12130.12168
[10]  
Cohen R., 2015, 2015846 CRYPT EPRINT