45 research outputs found
Efficient Unconditional Asynchronous Byzantine Agreement with Optimal Resilience
We present an efficient and optimally resilient Asynchronous Byzantine Agreement (ABA) protocol involving n = 3t+1 parties over a completely asynchronous network, tolerating a computationally unbounded Byzantine adversary, who can control at most t parties out of the n parties. The amortized communication complexity of our ABA protocol is O(n^{3} \log \frac{1}{\epsilon}) bits for attaining agreement on a single bit, where \epsilon (\epsilon > 0) denotes the probability of non-termination. We compare our protocol with the best known optimally resilient ABA protocols of Canetti et al.(STOC 1993) and Abraham et al.~(PODC 2008) and show that our protocol gains by a factor of O(n^{8} \log \frac{1}{\epsilon}^{3}) over the ABA protocol of Canetti et al. and by a factor of O(n^{5} \frac{\log{n}}{\log \frac{1}{\epsilon}}) over the ABA protocol of Abraham et al. in terms of the communication complexity.
To design our protocol, we first present a new, optimally resilient statistical asynchronous verifiable secret sharing (AVSS) protocol with n = 3t+1, which significantly improves the communication complexity of the only known optimally resilient statistical AVSS protocol of Canetti et al. Our AVSS protocol shares multiple secrets simultaneously and incurs lower communication complexity than executing multiple instances of an AVSS protocol sharing a single secret. To design our AVSS protocol, we further present a new asynchronous primitive called asynchronous weak commitment (AWC),
which acts as a substitute for asynchronous weak secret sharing (AWSS), which was used as a primitive for designing AVSS by Canetti et al. We observe that AWC has weaker requirements than the AWSS and hence can be designed more efficiently.
The common coin primitive is one of the most important building blocks for the construction of an ABA protocol. The best known common coin protocol of Feldman et al. requires multiple instances of an AVSS protocol sharing a single secret as a black-box. Unfortunately, this common coin protocol does not achieve its goal when the multiple invocations of AVSS sharing a single secret is replaced by a single invocation of an AVSS protocol sharing multiple secrets simultaneously. Therefore in this paper, we extend the existing common coin protocol to make it compatible with our new AVSS protocol (sharing multiple secrets). As a byproduct, our new common coin protocol is much more communication efficient than the existing common coin protocol
On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience
Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MPC protocol allows a set of mutually distrusting parties with private inputs to securely compute any publicly-known function of their inputs, by keeping their respective inputs as private as possible. While several works in the past have addressed the problem of designing communication-efficient MPC protocols in the synchronous communication setting, not much attention has been paid to the design of efficient MPC protocols in the asynchronous communication setting. In this work, we focus on the design of efficient asynchronous MPC (AMPC) protocol with statistical security, tolerating a computationally unbounded adversary, capable of corrupting up to parties out of the parties. The seminal work of Ben-Or, Kelmer and Rabin (PODC 1994) and later Abraham, Dolev and Stern (PODC 2020) showed that the optimal resilience for statistically-secure AMPC is . Unfortunately, the communication complexity of the protocol presented by Ben-Or et al is significantly high, where the communication complexity per multiplication is bits (where is the statistical-security parameter). To the best of our knowledge, no work has addressed the problem of improving the
communication complexity of the protocol of Ben-Or at al. In this work, our main contributions are the following.
-- We present a new statistically-secure AMPC protocol with the optimal resilience and where the communication complexity is bits per multiplication. Apart from improving upon the communication complexity of the protocol of Ben-Or et al, our protocol is relatively simpler and based on very few sub-protocols, unlike the protocol of Ben-Or et al which involves several layers of subprotocols. A central component of our AMPC protocol is a new and simple protocol for verifiable asynchronous complete secret-sharing (ACSS), which is of independent interest.
-- As a side result, we give the security proof for our AMPC protocol in the standard universal composability (UC) framework of Canetti (FOCS 2001, JACM 2020), which is now the defacto standard for proving the security of cryptographic protocols. This is unlike the protocol of Ben-Or et al, which was missing the formal security proofs
Brief Announcement: Crash-Tolerant Consensus in Directed Graph Revisited
We revisit the problem of distributed consensus in directed graphs tolerating crash failures; we improve the round and communication complexity of the existing protocols. Moreover, we prove that our protocol requires the optimal number of communication rounds, required by any protocol belonging to a specific class of crash-tolerant consensus protocols in directed graphs
The Round Complexity of General VSS
The round complexity of verifiable secret sharing (VSS) schemes has been studied extensively for threshold adversaries. In particular, Fitzi et al. showed an efficient 3-round VSS for \cite{FitziVSSTCC06}, where an infinitely powerful adversary can corrupt t (or less) parties out of parties. This paper shows that for non-threshold adversaries,
-Two round VSS is possible iff the underlying adversary structure
satisfies condition;
-Three round VSS is possible iff the underlying adversary structure
satisfies condition.
Further as a special case of our three round protocol, we can obtain a more efficient 3-round VSS than the VSS of Fitzi et al. for . More precisely, the communication complexity of the reconstruction phase is reduced from to . We finally point out a flaw in the reconstruction phase of VSS of Fitzi et al., and show how to fix it
A Survey on Perfectly-Secure Verifiable Secret-Sharing
Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as an important building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. VSS has been widely studied in various dimensions over the last three decades and several important results have been achieved related to the fault-tolerance, round-complexity and communication efficiency of VSS schemes. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly-secure VSS schemes in three different settings, namely synchronous, asynchronous and hybrid communication settings and provide the full details of each of the existing schemes in these settings. The aim of this survey is to provide a clear knowledge and foundation to researchers who are interested in knowing and extending the state-of-the-art perfectly-secure VSS schemes
Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
Patra et al. gave a necessary and sufficient condition for the possibility of almost perfectly secure message transmission protocols tolerating general, non-threshold Q^2 adversary structure. However, their protocol requires at least three rounds and performs exponential (exponential in the size of the adversary structure) computation and communication. Moreover, they have left it as an open problem to design efficient protocol for almost perfectly secure message transmission, tolerating Q^2 adversary structure.
In this paper, we show the first single round almost perfectly secure message transmission protocol tolerating Q^2 adversary structure. The computation and communication complexities of the protocol are both polynomial} in the size of underlying linear secret sharing scheme (LSSS) and adversary structure. This solves the open problem raised by Patra et al..
When we restrict our general protocol to threshold adversary with n=2t+1, we obtain a single round, communication optimal almost secure message transmission protocol tolerating threshold adversary, which is much more computationally efficient and relatively simpler than the previous communication optimal protocol of Srinathan et al
Statistically Reliable and Secure Message Transmission in Directed Networks
Consider the following problem: a sender S and a receiver R are part of a directed synchronous network and connected through intermediate nodes. Specifically, there exists n node disjoint paths, also called as wires, which are directed from S to R and u wires, which are directed from R to S. Moreover, the wires from S to R are disjoint from the wires directed from R to S. There exists a centralized, static adversary who has unbounded computing power and who can control at most t wires between S and R in Byzantine fashion. S has a message m^S, which we wants to send to R. The challenge is to design a protocol, such that after interacting in phases as per the protocol,
R should correctly output m^R = m^S, except with error probability
2^{-\Omega(\kappa)}, where \kappa is the error parameter. This problem is called as statistically reliable message transmission (SRMT). The problem of statistically secure message transmission
(SSMT) has an additional requirement that at the end of the protocol, m^S should be information theoretically secure.
Desmedt et.al have given the necessary and sufficient condition for the existence of SRMT and SSMT protocols in the above settings. They also presented an SSMT protocol, satisfying their characterization. Desmedt et.al claimed that their protocol is efficient and has polynomial computational and communication complexity. However, we show that it is not so. That is, we specify an adversary strategy, which may cause the protocol to have exponential computational and communication complexity. We then present new and efficient SRMT and SSMT protocols, satisfying the characterization of Desmedt et.al Finally we show that the our proposed protocols are communication optimal by deriving lower bound on the communication complexity of SRMT and SSMT protocols. As far our knowledge is concerned, our protocols are the first communication optimal SRMT and SSMT protocols in directed networks
Disruption of T cell tolerance to self-immunoglobulin causes polyclonal B cell stimulation followed by inactivation of responding autoreactive T cells
Scavenger receptor (SR)-specific delivery by maleylation of a ubiquitous self-protein, Ig, to SR-bearing APCs results in self-limiting induction of autoimmune effects in vivo. Immunization with maleyl-Ig breaks T cell tolerance to self-Ig and causes hypergammaglobulinemia, with increases in spleen weight and cellularity. The majority of splenic B cells show an activated phenotype upon maleyl-Ig immunization, leading to large-scale conversion to a CD138+ phenotype and to significant increases in CD138-expressing splenic plasma cells. The polyclonal B cell activation, hypergammaglobulinemia, and autoreactive Ig-specific T cell responses decline over a 2-mo period postimmunization. Following adoptive transfer, T cells from maleyl-Ig-immune mice taken at 2 wk postimmunization can induce hypergammaglobulinemia in the recipients, but those taken at 10 wk postimmunization cannot. Hypergammaglobulinemia in the adoptive transfer recipients is also transient and is followed by an inability to respond to fresh maleyl-Ig immunization, suggesting that the autoreactive Ig-specific T cells are inactivated peripherally following disruption of tolerance. Thus, although autoreactive T cell responses to a ubiquitous self-Ag, Ig, are induced by SR-mediated delivery to professional APCs in vivo resulting in autoimmune pathophysiological effects, they are effectively and rapidly turned off by inactivation of these activated Ig-specific T cells in vivo
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
The concrete efficiency of secure computation has been the focus of many
recent works. In this work, we present concretely-efficient protocols for
secure -party computation (3PC) over a ring of integers modulo
tolerating one corruption, both with semi-honest and malicious security. Owing
to the fact that computation over ring emulates computation over the real-world
system architectures, secure computation over ring has gained momentum of late.
Cast in the offline-online paradigm, our constructions present the most
efficient online phase in concrete terms. In the semi-honest setting, our
protocol requires communication of ring elements per multiplication gate
during the {\it online} phase, attaining a per-party cost of {\em less than one
element}. This is achieved for the first time in the regime of 3PC. In the {\it
malicious} setting, our protocol requires communication of elements per
multiplication gate during the online phase, beating the state-of-the-art
protocol by elements. Realized with both the security notions of selective
abort and fairness, the malicious protocol with fairness involves slightly more
communication than its counterpart with abort security for the output gates
{\em alone}.
We apply our techniques from PC in the regime of secure server-aided
machine-learning (ML) inference for a range of prediction functions-- linear
regression, linear SVM regression, logistic regression, and linear SVM
classification. Our setting considers a model-owner with trained model
parameters and a client with a query, with the latter willing to learn the
prediction of her query based on the model parameters of the former. The inputs
and computation are outsourced to a set of three non-colluding servers. Our
constructions catering to both semi-honest and the malicious world, invariably
perform better than the existing constructions.Comment: This article is the full and extended version of an article appeared
in ACM CCSW 201
Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality
We study the interplay of network connectivity and the issues related to the ‘possibility’, ‘feasibility’ and ‘optimality’ for unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) in an undirected
synchronous network, under the influence of an adaptive mixed adversary having unbounded computing power, who can corrupt some of the nodes in the network in Byzantine, omission, fail-stop and passive fashion respectively. We consider two types of adversary, namely threshold and non-threshold. One of the important conclusions we arrive at from our study is that allowing a negligible error probability significantly helps in the ‘possibility’, ‘feasibility’ and ‘optimality’ of both reliable and secure message transmission protocols. To design our protocols, we propose several new techniques which are of independent interest