Probabilistic Termination and Composability of Cryptographic Protocols

被引:21
作者
Cohen, Ran [1 ]
Coretti, Sandro [2 ]
Garay, Juan [3 ]
Zikas, Vassilis [4 ]
机构
[1] Bar Ilan Univ, Dept Comp Sci, Ramat Gan, Israel
[2] ETH, Dept Comp Sci, Zurich, Switzerland
[3] Yahoo Res, Sunnyvale, CA USA
[4] RPI, Dept Comp Sci, Troy, NY USA
来源
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III | 2016年 / 9816卷
基金
瑞士国家科学基金会;
关键词
MULTIPARTY COMPUTATION; BYZANTINE AGREEMENT; SECURITY; TIME;
D O I
10.1007/978-3-662-53015-3_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
When analyzing the round complexity of multi-party computation (MPC), one often overlooks the fact that underlying resources, such as a broadcast channel, can by themselves be expensive to implement. For example, it is impossible to implement a broadcast channel by a (deterministic) protocol in a sub-linear (in the number of corrupted parties) number of rounds. The seminal works of Rabin and Ben-Or from the early 80's demonstrated that limitations as the above can be overcome by allowing parties to terminate in different rounds, igniting the study of protocols with probabilistic termination. However, absent a rigorous simulation-based definition, the suggested protocols are proven secure in a property-based manner, guaranteeing limited composability. In this work, we define MPC with probabilistic termination in the UC framework. We further prove a special universal composition theorem for probabilistic-termination protocols, which allows to compile a protocol using deterministic-termination hybrids into a protocol that uses expected-constant-round protocols for emulating these hybrids, preserving the expected round complexity of the calling protocol. We showcase our definitions and compiler by providing the first composable protocols (with simulation-based security proofs) for the following primitives, relying on point-to-point channels: (1) expected-constant round perfect Byzantine agreement, (2) expected-constant-round perfect parallel broadcast, and (3) perfectly secure MPC with round complexity independent of the number of parties.
引用
收藏
页码:240 / 269
页数:30
相关论文
共 49 条
[1]  
[Anonymous], 1984, 3 ACM PODC
[2]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
[3]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[4]  
Asharov Gilad., 2011, ELECT C COMPUTATIONA, V18, P36
[5]  
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[6]   Resilient-optimal interactive consistency in constant time [J].
Ben-Or, M ;
El-Yaniv, R .
DISTRIBUTED COMPUTING, 2003, 16 (04) :249-262
[7]  
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[8]  
Ben-Or M., 1983, 2 ACM PODC, P27
[9]  
Cachin C., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P524
[10]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145