On Achieving the "Best of Both Worlds" in Secure Multiparty Computation

被引:54
作者
Katz, Jonathan [1 ]
机构
[1] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
来源
STOC 07: PROCEEDINGS OF THE 39TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING | 2007年
关键词
Secure Computation;
D O I
10.1145/1250790.1250793
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Two settings are typically considered for secure multiparty computation, depending on whether or not a majority of the parties are assumed to be honest. Protocols designed under this assumption provide "full security" (and, in particular, guarantee output delivery and fairness) when this assumption is correct; however, if half or more of the parties are dishonest their security is completely compromised. On the other hand, protocols tolerating arbitrarily-many faults do not provide fairness or guaranteed output delivery even if only a single party is dishonest. It is natural to wonder whether it is possible to achieve the "best of both worlds": namely, a single protocol that simultaneously achieves the best possible security in both the above settings. Isha, et al. (Crypto 2006) recently addressed this question, and ruled out constant-round protocols of this type. As our main result, we completely settle the question by ruling out protocols using any (expected) polynomial number of rounds. Given this stark negative result, we then ask what can be achieved if we are willing to assume simultaneous message transmission (or, equivalently, a non-rushing adversary). In this setting, we show that impossibility still holds for logarithmic-round protocols. We also show, for any polynomial p, a protocol (whose round complexity depends on P) that can be simulated to within closeness O(1/P).
引用
收藏
页码:11 / 20
页数:10
相关论文
共 27 条
[1]  
BEAVER D, MULTIPARTY PROTOCOLS
[2]  
BEAVER D, ROUND COMPLEXITY SEC
[3]  
BEAVER D, MULTIPARTY COMPUTATI
[4]  
Ben-Or M., COMPLETENESS THEOREM
[5]  
Boneh D, 2000, TIMED COMMITMENTS
[6]   Security and composition of multiparty cryptographic protocols [J].
Canetti, R .
JOURNAL OF CRYPTOLOGY, 2000, 13 (01) :143-202
[7]  
CHAUM D, MULTIPARTY UNCONDITI
[8]  
CLEVE R, LIMITS SECURITY COIN
[9]  
CLEVE R, CONTROLLED GRADUAL D
[10]   A RANDOMIZED PROTOCOL FOR SIGNING CONTRACTS [J].
EVEN, S ;
GOLDREICH, O ;
LEMPEL, A .
COMMUNICATIONS OF THE ACM, 1985, 28 (06) :637-647