Multi-Party Computation in Presence of Corrupted Majorities
Dominik Raub
Institute of Theoretical Computer Science ETH Zürich
- n joint work with
- R. Künzler, J. Müller-Quade, C. Lucas, U. Maurer, M. Fitzi
Mäetaguse, 2009/10/04
Multi-Party Computation in Presence of Corrupted Majorities Dominik - - PowerPoint PPT Presentation
Multi-Party Computation in Presence of Corrupted Majorities Dominik Raub Institute of Theoretical Computer Science ETH Zrich on joint work with R. Knzler, J. Mller-Quade, C. Lucas, U. Maurer, M. Fitzi Metaguse, 2009/10/04 Multi-Party
Institute of Theoretical Computer Science ETH Zürich
Mäetaguse, 2009/10/04
a c t
pa s
s h
a c t
pa s
s h
a c t
pa s
s h
a c t
pa s
s h
l t s
ut l t s
ns
;pki
l t s
– Computational assumptions only during protocol run
a c t
pa s
s h
l t s
ut l t s
ns
;pki
l t s
– Computational assumptions only during protocol run
a c t
pa s
s h
l t s
ut l t s
ns
;pki
l t s
– computationally forces semi-honest behavior – maintains IT security against semi-honest adversary
Input:
Input:
Input:
Input:
Input:
Input:
Input:
– : decomposability – : decomposability after removing redundancy – : decomposability after removing redundancy,
a c t
pa s
s h
ns
;pk
i l t s
ut l t s = Fbc l t s= Fbc s h
>
>
>
>
>
R'
>
R'
>
R'
>
R'
>
R'
>
R'
>
– with BC
– with BC – without BC but with PKI – without BC or PKI
Input:
– For t ≤ lr full (robust) security – For t ≤ lf fair security – For t ≤ L abort security
– For t ≤ tc computationally unbounded adversaries – For t ≤ tσ signature forgery – For t ≤ tp inconsistent PKIs
– with BC under the bounds
– without BC but with PKI under the bounds
tp > 0
– without BC or PKI under the bounds
– For t = 0 unconditionally – For t ≤ tσ conditional on PKI consistency – For t ≤ T conditional on unforgeability and PKI
– For t ≤ tσ full broadcast – For t ≤ T validity, conditional on unforgeability
– For t ≤ tσ full broadcast – For t ≤ T validity, conditional on unforgeability
>
>
>
>
>
>
>
σ < n/3
>
σ < n/3
>
>
σ < n/3
>
σ < n/3
= Sjv
>
σ < n/3
= Sjv
>
σ < n/3
= Sjv
>
σ < n/3
j ∈ Siv,0 ⇔ j ∈ Siv
= Sjv
>
– For t = 0 full BC – For t ≤ tσ full BC, conditional on PKI consistency – For t ≤ T full BC, conditional on unforgeability and
– Attempt detectable precomputation of a new PKI
– Run an HBC for 2tσ+T < n and tp = -1 constructed
>
>
>
>
>
>
>
>
>
>
>
>
>
>