4 research outputs found

    A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation

    Get PDF
    At STOC \u2787, Goldreich et al.~presented two protocols for secure multi-party computation (MPC) among nn parties: The first protocol provides \emph{passive} security against t<nt<n corrupted parties. The second protocol provides even \emph{active} security, but only against t<n/2t<n/2 corrupted parties. Although these protocols provide security against the provably highest possible number of corruptions, each of them has its limitation: The first protocol is rendered completely insecure in presence of a single active corruption, and the second protocol is rendered completely insecure in presence of ⌈n/2βŒ‰\lceil n/2 \rceil passive corruptions. At Crypto 2006, Ishai et al.~combined these two protocols into a single protocol which provides passive security against t<nt<n corruptions and active security against t<n/2t<n/2 corruptions. This protocol unifies the security guarantees of the passive world and the active world (``best of both worlds\u27\u27). However, the corruption threshold t<nt<n can be tolerated only when \emph{all} corruptions are passive. With a single active corruption, the threshold is reduced to t<n/2t<n/2. As our main result, we introduce a \emph{dynamic tradeoff} between active and passive corruptions: We present a protocol which provides security against t<nt<n passive corruptions, against t<n/2t<n/2 active corruptions, \emph{and everything in between}. In particular, our protocol provides full security against kk active corruptions, as long as less than nβˆ’kn-k parties are corrupted in total, for any unknown kk. The main technical contribution is a new secret sharing scheme that, in the reconstruction phase, releases secrecy \emph{gradually}. This allows to construct non-robust MPC protocols which, in case of an abort, still provide some level of secrecy. Furthermore, using similar techniques, we also construct protocols for reactive MPC with hybrid security, i.e., different thresholds for secrecy, correctness, robustness, and fairness. Intuitively, the more corrupted parties, the less security is guaranteed

    Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer

    Get PDF
    We describe a new protocol to achieve two party Ο΅\epsilon-fair exchange: at any point in the unfolding of the protocol the difference in the probabilities of the parties having acquired the desired term is bounded by a value Ο΅\epsilon that can be made as small as necessary. Our construction uses oblivious transfer and sidesteps previous impossibility results by using a timed-release encryption, that releases its contents only after some lower bounded time. We show that our protocol can be easily generalized to an Ο΅\epsilon-fair two-party protocol for all functionalities. To our knowledge, this is the first protocol to truly achieve Ο΅\epsilon-fairness for all functionalities. All previous constructions achieving some form of fairness for all functionalities (without relying on a trusted third party) had a strong limitation: the fairness guarantee was only guaranteed to hold if the honest parties are at least as powerful as the corrupted parties and invest a similar amount of resources in the protocol, an assumption which is often not realistic. Our construction does not have this limitation: our protocol provides a clear upper bound on the running time of all parties, and partial fairness holds even if the corrupted parties have much more time or computational power than the honest parties. Interestingly, this shows that a minimal use of timed-release encryption suffices to circumvent an impossibility result of Katz and Gordon regarding Ο΅\epsilon-fair computation for all functionalities, without having to make the (unrealistic) assumption that the honest parties are as computationally powerful as the corrupted parties - this assumption was previously believed to be unavoidable in order to overcome this impossibility result. We present detailed security proofs of the new construction, which are non-trivial and form the core technical contribution of this work

    Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness

    Get PDF
    Consider the representative task of designing a distributed coin-tossing protocol for nn processors such that the probability of heads is X0∈[0,1]X_0\in[0,1]. This protocol should be robust to an adversary who can reset one processor to change the distribution of the final outcome. For X0=1/2X_0=1/2, in the information-theoretic setting, no adversary can deviate the probability of the outcome of the well-known Blum\u27s ``majority protocol\u27\u27 by more than 12Ο€n\frac1{\sqrt{2\pi n}}, i.e., it is 12Ο€n\frac1{\sqrt{2\pi n}} insecure. In this paper, we study discrete-time martingales (X0,X1,…,Xn)(X_0,X_1,\dotsc,X_n) such that Xi∈[0,1]X_i\in[0,1], for all i∈{0,…,n}i\in\{0,\dotsc,n\}, and Xn∈{0,1}X_n\in\{0,1\}. These martingales are commonplace in modeling stochastic processes like coin-tossing protocols in the information-theoretic setting mentioned above. In particular, for any X0∈[0,1]X_0\in[0,1], we construct martingales that yield 12X0(1βˆ’X0)n\frac12\sqrt{\frac{X_0(1-X_0)}{n}} insecure coin-tossing protocols. For X0=1/2X_0=1/2, our protocol requires only 40\% of the processors to achieve the same security as the majority protocol. The technical heart of our paper is a new inductive technique that uses geometric transformations to precisely account for the large gaps in these martingales. For any X0∈[0,1]X_0\in[0,1], we show that there exists a stopping time Ο„\tau such that E[∣XΟ„βˆ’XΟ„βˆ’1∣]β‰₯22nβˆ’1β‹…X0(1βˆ’X0)\mathbb{E}[\left\vert X_\tau-X_{\tau-1} \right\vert] \geq \frac2{\sqrt{2n-1}}\cdot X_0(1-X_0) The inductive technique simultaneously constructs martingales that demonstrate the optimality of our bound, i.e., a martingale where the gap corresponding to any stopping time is small. In particular, we construct optimal martingales such that \textit{ any} stopping time Ο„\tau has E[∣XΟ„βˆ’XΟ„βˆ’1∣]≀1nβ‹…X0(1βˆ’X0)\mathbb{E}[\left\vert X_\tau-X_{\tau-1} \right\vert] \leq \frac1{\sqrt{n}}\cdot \sqrt{X_0(1-X_0)} Our lower-bound holds for all X0∈[0,1]X_0\in[0,1]; while the previous bound of Cleve and Impagliazzo (1993) exists only for positive constant X0X_0. Conceptually, our approach only employs elementary techniques to analyze these martingales and entirely circumvents the complex probabilistic tools inherent to the approaches of Cleve and Impagliazzo (1993) and Beimel, Haitner, Makriyannis, and Omri (2018). By appropriately restricting the set of possible stopping-times, we present representative applications to constructing distributed coin-tossing/dice-rolling protocols, discrete control processes, fail-stop attacking coin-tossing/dice-rolling protocols, and black-box separations
    corecore