Secure Multi-Party Computation Lecture 17 GMW & BGW Protocols - - PowerPoint PPT Presentation

secure multi party computation
SMART_READER_LITE
LIVE PREVIEW

Secure Multi-Party Computation Lecture 17 GMW & BGW Protocols - - PowerPoint PPT Presentation

Secure Multi-Party Computation Lecture 17 GMW & BGW Protocols MPC Protocols MPC Protocols Yao s Garbled Circuit : 2-Party SFE secure against passive adversaries MPC Protocols Yao s Garbled Circuit : 2-Party SFE secure against


slide-1
SLIDE 1

Secure Multi-Party Computation

Lecture 17 GMW & BGW Protocols

slide-2
SLIDE 2

MPC Protocols

slide-3
SLIDE 3

MPC Protocols

Yao’ s Garbled Circuit : 2-Party SFE secure against passive adversaries

slide-4
SLIDE 4

MPC Protocols

Yao’ s Garbled Circuit : 2-Party SFE secure against passive adversaries Using OT and PRG

slide-5
SLIDE 5

MPC Protocols

Yao’ s Garbled Circuit : 2-Party SFE secure against passive adversaries Using OT and PRG Today

slide-6
SLIDE 6

MPC Protocols

Yao’ s Garbled Circuit : 2-Party SFE secure against passive adversaries Using OT and PRG Today Passive-secure GMW protocol: Generalizes to any number of parties, uses OT only

slide-7
SLIDE 7

MPC Protocols

Yao’ s Garbled Circuit : 2-Party SFE secure against passive adversaries Using OT and PRG Today Passive-secure GMW protocol: Generalizes to any number of parties, uses OT only Passive-secure BGW protocol: Doesn’ t even use OT, but relies on honest-majority

slide-8
SLIDE 8

MPC Protocols

Yao’ s Garbled Circuit : 2-Party SFE secure against passive adversaries Using OT and PRG Today Passive-secure GMW protocol: Generalizes to any number of parties, uses OT only Passive-secure BGW protocol: Doesn’ t even use OT, but relies on honest-majority Going from passive to active security

slide-9
SLIDE 9

Basic GMW

slide-10
SLIDE 10

Basic GMW

Adapted from the famous Goldreich-Micali-Wigderson (1987) protocol (by Goldreich-Vainish, Haber-Micali,…)

slide-11
SLIDE 11

Basic GMW

Adapted from the famous Goldreich-Micali-Wigderson (1987) protocol (by Goldreich-Vainish, Haber-Micali,…) Idea: Evaluate a circuit with wire values secured using (linear) secret-sharing

slide-12
SLIDE 12

Recall Secret-Sharing

slide-13
SLIDE 13

Recall Secret-Sharing

Fix any “secret” s. Let a, b be random conditioned on s = a + b. (All elements from a finite field.)

slide-14
SLIDE 14

Recall Secret-Sharing

Fix any “secret” s. Let a, b be random conditioned on s = a + b. (All elements from a finite field.) Each of a, b by itself carries no information about s. (e.g., can pick a at random, set b = s - a.)

slide-15
SLIDE 15

Recall Secret-Sharing

Fix any “secret” s. Let a, b be random conditioned on s = a + b. (All elements from a finite field.) Each of a, b by itself carries no information about s. (e.g., can pick a at random, set b = s - a.) Will write [s]1 and [s]2 to denote shares of s

slide-16
SLIDE 16

Computing on Shares

slide-17
SLIDE 17

Computing on Shares

Let gates be + & ⨉ (XOR & AND for Boolean circuits)

slide-18
SLIDE 18

Computing on Shares

Let gates be + & ⨉ (XOR & AND for Boolean circuits) Plan: shares of each wire value will be computed, with Alice holding one share and Bob the other. At the end, Alice sends her share of output wire to Bob.

[u]1 [v]1 [u]2 [v]2 u v

slide-19
SLIDE 19

Computing on Shares

Let gates be + & ⨉ (XOR & AND for Boolean circuits) Plan: shares of each wire value will be computed, with Alice holding one share and Bob the other. At the end, Alice sends her share of output wire to Bob.

[u]1 [v]1 [u]2 [v]2 u v [w]1 [w]2

slide-20
SLIDE 20

Computing on Shares

Let gates be + & ⨉ (XOR & AND for Boolean circuits) Plan: shares of each wire value will be computed, with Alice holding one share and Bob the other. At the end, Alice sends her share of output wire to Bob.

[u]1 [v]1 [u]2 [v]2 u v [w]1 [w]2 w

slide-21
SLIDE 21

Computing on Shares

Let gates be + & ⨉ (XOR & AND for Boolean circuits) Plan: shares of each wire value will be computed, with Alice holding one share and Bob the other. At the end, Alice sends her share of output wire to Bob. w = u + v : Each one locally computes [w]i = [u]i + [v]i

[u]1 [v]1 [u]2 [v]2 u v [w]1 [w]2

+

w

slide-22
SLIDE 22

Computing on Shares

Let gates be + & ⨉ (XOR & AND for Boolean circuits) Plan: shares of each wire value will be computed, with Alice holding one share and Bob the other. At the end, Alice sends her share of output wire to Bob. w = u + v : Each one locally computes [w]i = [u]i + [v]i

[u]1 [v]1 [u]2 [v]2 u v [w]1 [w]2

+

w

+ +

slide-23
SLIDE 23

Computing on Shares

w u v

[u]1 [v]1 [u]2 [v]2

slide-24
SLIDE 24

Computing on Shares

What about w = u ⨉ v ?

w u v

[u]1 [v]1 [u]2 [v]2

slide-25
SLIDE 25

Computing on Shares

What about w = u ⨉ v ? Want [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 )

w u v

[u]1 [v]1 [u]2 [v]2

slide-26
SLIDE 26

Computing on Shares

What about w = u ⨉ v ? Want [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Alice picks [w]1. Can let Bob compute [w]2 using the naive protocol for small functions

w u v

[u]1 [v]1 [u]2 [v]2

slide-27
SLIDE 27

Computing on Shares

What about w = u ⨉ v ? Want [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Alice picks [w]1. Can let Bob compute [w]2 using the naive protocol for small functions

w u v

[u]1 [v]1 [u]2 [v]2 [w]1

slide-28
SLIDE 28

Computing on Shares

What about w = u ⨉ v ? Want [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Alice picks [w]1. Can let Bob compute [w]2 using the naive protocol for small functions

w u v

[u]1 [v]1 [u]2 [v]2

F

[w]1

slide-29
SLIDE 29

Computing on Shares

What about w = u ⨉ v ? Want [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Alice picks [w]1. Can let Bob compute [w]2 using the naive protocol for small functions

w u v

[u]1 [v]1 [u]2 [v]2

F

[w]1 [w]2

slide-30
SLIDE 30

Computing on Shares

What about w = u ⨉ v ? Want [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Alice picks [w]1. Can let Bob compute [w]2 using the naive protocol for small functions

Bob’ s input is ([u]2,[v]2). Over the binary field, this requires a single 1-out-of-4 OT.

w u v

[u]1 [v]1 [u]2 [v]2

F

[w]1 [w]2

slide-31
SLIDE 31

GMW: many parties

slide-32
SLIDE 32

GMW: many parties

m-way sharing: s = [s]1 +…+ [s]m

Allows security against arbitrary number of corruptions

slide-33
SLIDE 33

GMW: many parties

m-way sharing: s = [s]1 +…+ [s]m Addition, local as before

Allows security against arbitrary number of corruptions

slide-34
SLIDE 34

GMW: many parties

m-way sharing: s = [s]1 +…+ [s]m Addition, local as before Multiplication: For w = u ⨉ v
 [w]1 +..+ [w]m = ( [u]1 +..+ [u]m ) ⨉ ( [v]1 +..+ [v]m ) Party i computes [u]i[v]i For every pair (i,j), i≠j, Party i picks random aij and lets Party j securely compute bij s.t. aij + bij = [u]i[v]j using the naive protocol (a single 1-out-of-2 OT) Party i sets [w]i = [u]i[v]i + Σj ( aij + bji )

Allows security against arbitrary number of corruptions

slide-35
SLIDE 35

GMW: with active corruption

Original GMW approach: Use Zero Knowledge proofs (next time) to force the parties to run the protocol honestly Needs (passive-secure) OT to be implemented using a protocol Alternate constructions give information-theoretic reduction to OT, starting from passive-secure GMW Recent approach: pre-compile the circuit

slide-36
SLIDE 36

Passive-Secure GMW: Closer Look

slide-37
SLIDE 37

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 )

slide-38
SLIDE 38

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Computing shares a12, b12 s.t. a12 + b12 = [u]1⋅[v]2:

slide-39
SLIDE 39

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Computing shares a12, b12 s.t. a12 + b12 = [u]1⋅[v]2: Alice picks a12 and sends (-a12, [u]1-a12) to OT. Bob sends [v]2 to OT.

slide-40
SLIDE 40

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Computing shares a12, b12 s.t. a12 + b12 = [u]1⋅[v]2: Alice picks a12 and sends (-a12, [u]1-a12) to OT. Bob sends [v]2 to OT. What if Alice sends arbitrary (x,y) to OT? Effectively, setting a12 = -x, [u]1’ = y-x.

slide-41
SLIDE 41

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Computing shares a12, b12 s.t. a12 + b12 = [u]1⋅[v]2: Alice picks a12 and sends (-a12, [u]1-a12) to OT. Bob sends [v]2 to OT. What if Alice sends arbitrary (x,y) to OT? Effectively, setting a12 = -x, [u]1’ = y-x. What Bob sends to OT is [v]2’

slide-42
SLIDE 42

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Computing shares a12, b12 s.t. a12 + b12 = [u]1⋅[v]2: Alice picks a12 and sends (-a12, [u]1-a12) to OT. Bob sends [v]2 to OT. What if Alice sends arbitrary (x,y) to OT? Effectively, setting a12 = -x, [u]1’ = y-x. What Bob sends to OT is [v]2’ i.e., arbitrary behavior of Alice & Bob while sharing [u]1⋅[v]2 correspond to them locally changing their shares [u]1 and [v]2

slide-43
SLIDE 43

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Arbitrary behavior of Alice while sharing [u]1⋅[v]2 and [u]2⋅[v]1 corresponds to her locally changing her shares

  • f u and v
slide-44
SLIDE 44

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Arbitrary behavior of Alice while sharing [u]1⋅[v]2 and [u]2⋅[v]1 corresponds to her locally changing her shares

  • f u and v

Alice changing her share from [u]1 to [u]1’ is effectively changing u to u+Δu, where Δu = [u]1’ - [u]1 depends

  • nly on her own view
slide-45
SLIDE 45

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Arbitrary behavior of Alice while sharing [u]1⋅[v]2 and [u]2⋅[v]1 corresponds to her locally changing her shares

  • f u and v

Alice changing her share from [u]1 to [u]1’ is effectively changing u to u+Δu, where Δu = [u]1’ - [u]1 depends

  • nly on her own view

Over all effect: a corrupt party can arbitrarily add Δu and Δv to wires u and v before multiplication

slide-46
SLIDE 46

Passive-Secure GMW: Closer Look

Multiplication: [w]1 + [w]2 = ( [u]1 + [u]2 ) ⨉ ( [v]1 + [v]2 ) Arbitrary behavior of Alice while sharing [u]1⋅[v]2 and [u]2⋅[v]1 corresponds to her locally changing her shares

  • f u and v

Alice changing her share from [u]1 to [u]1’ is effectively changing u to u+Δu, where Δu = [u]1’ - [u]1 depends

  • nly on her own view

Over all effect: a corrupt party can arbitrarily add Δu and Δv to wires u and v before multiplication Also, can add deltas to all input and output wires

slide-47
SLIDE 47

Active-Secure Variant of Basic GMW

slide-48
SLIDE 48

Active-Secure Variant of Basic GMW

Any active attack on Basic GMW protocol corresponds to an additive attack on the wires of the circuit

slide-49
SLIDE 49

Active-Secure Variant of Basic GMW

Any active attack on Basic GMW protocol corresponds to an additive attack on the wires of the circuit Idea: “Compile” the circuit such that any additive attack amounts to error (w.h.p.), resulting in random output

slide-50
SLIDE 50

Active-Secure Variant of Basic GMW

Any active attack on Basic GMW protocol corresponds to an additive attack on the wires of the circuit Idea: “Compile” the circuit such that any additive attack amounts to error (w.h.p.), resulting in random output Additive Manipulation Detecting (AMD) circuits

slide-51
SLIDE 51

Active-Secure Variant of Basic GMW

Any active attack on Basic GMW protocol corresponds to an additive attack on the wires of the circuit Idea: “Compile” the circuit such that any additive attack amounts to error (w.h.p.), resulting in random output Additive Manipulation Detecting (AMD) circuits Extension of “AMD codes”

slide-52
SLIDE 52

Active-Secure Variant of Basic GMW

Any active attack on Basic GMW protocol corresponds to an additive attack on the wires of the circuit Idea: “Compile” the circuit such that any additive attack amounts to error (w.h.p.), resulting in random output Additive Manipulation Detecting (AMD) circuits Extension of “AMD codes” e.g. encode x as a vector (x, r, xr) where r is random from a large field. Additive attacks (without knowing r) detected unless (x+δ1)(r+δ2) = (xr+δ3): i.e., δ1⋅r + x⋅δ2 + δ1⋅δ2 = δ3. Unlikely unless δ1 = 0.

slide-53
SLIDE 53

Honest Majority

slide-54
SLIDE 54

Honest Majority

So far, arbitrary number of parties can be corrupted (in particular, secure 2-party computation, when one party is corrupt) But needed to rely on OT

slide-55
SLIDE 55

Honest Majority

So far, arbitrary number of parties can be corrupted (in particular, secure 2-party computation, when one party is corrupt) But needed to rely on OT Up Next: Adversary can corrupt any set of less than t parties out of m parties (e.g., t = n/2, t=n/3) Then, can get (UC) security just from secure communication channels Bonus (omitted): Can ask for guaranteed output delivery

slide-56
SLIDE 56

BGW: Passive Security

Ben-Or, Goldwasser, Wigderson (1988)

slide-57
SLIDE 57

BGW: Passive Security

Ben-Or, Goldwasser, Wigderson (1988) Similar result by Chaum, Crepeau, Damgård (1988)

slide-58
SLIDE 58

BGW: Passive Security

Ben-Or, Goldwasser, Wigderson (1988) Similar result by Chaum, Crepeau, Damgård (1988) Again, gate-by-gate evaluation of shared wire-values

slide-59
SLIDE 59

BGW: Passive Security

Ben-Or, Goldwasser, Wigderson (1988) Similar result by Chaum, Crepeau, Damgård (1988) Again, gate-by-gate evaluation of shared wire-values Idea 1: Use a linear secret-sharing scheme that allows local multiplication

slide-60
SLIDE 60

BGW: Passive Security

Ben-Or, Goldwasser, Wigderson (1988) Similar result by Chaum, Crepeau, Damgård (1988) Again, gate-by-gate evaluation of shared wire-values Idea 1: Use a linear secret-sharing scheme that allows local multiplication Result can use a different linear secret-sharing scheme

slide-61
SLIDE 61

BGW: Passive Security

Ben-Or, Goldwasser, Wigderson (1988) Similar result by Chaum, Crepeau, Damgård (1988) Again, gate-by-gate evaluation of shared wire-values Idea 1: Use a linear secret-sharing scheme that allows local multiplication Result can use a different linear secret-sharing scheme Will rely on < n/2 corruption

slide-62
SLIDE 62

BGW: Passive Security

Ben-Or, Goldwasser, Wigderson (1988) Similar result by Chaum, Crepeau, Damgård (1988) Again, gate-by-gate evaluation of shared wire-values Idea 1: Use a linear secret-sharing scheme that allows local multiplication Result can use a different linear secret-sharing scheme Will rely on < n/2 corruption Idea 2: Can move from one linear secret-sharing scheme to another securely

slide-63
SLIDE 63

BGW

Idea 1: Use a linear secret-sharing that allows local multiplication, but resulting in shares in a different linear secret-sharing scheme

slide-64
SLIDE 64

BGW

Idea 1: Use a linear secret-sharing that allows local multiplication, but resulting in shares in a different linear secret-sharing scheme Shamir secret-sharing using degree ⌊(n-1)/2⌋ polynomials (privacy against < n/2 (≤ degree+1) corruption) [s]i = (xi) where polynomial s.t. (0) = s (0) = a linear combination of degree+1 shares {(xi)}i

slide-65
SLIDE 65

BGW

Idea 1: Use a linear secret-sharing that allows local multiplication, but resulting in shares in a different linear secret-sharing scheme Shamir secret-sharing using degree ⌊(n-1)/2⌋ polynomials (privacy against < n/2 (≤ degree+1) corruption) [s]i = (xi) where polynomial s.t. (0) = s (0) = a linear combination of degree+1 shares {(xi)}i Multiplying two such polynomials for secrets s, t: 
 π = .. Then [s⋅t]i = π(xi) = (xi)⋅(xi) and π(0) = s⋅t

slide-66
SLIDE 66

BGW

Idea 1: Use a linear secret-sharing that allows local multiplication, but resulting in shares in a different linear secret-sharing scheme Shamir secret-sharing using degree ⌊(n-1)/2⌋ polynomials (privacy against < n/2 (≤ degree+1) corruption) [s]i = (xi) where polynomial s.t. (0) = s (0) = a linear combination of degree+1 shares {(xi)}i Multiplying two such polynomials for secrets s, t: 
 π = .. Then [s⋅t]i = π(xi) = (xi)⋅(xi) and π(0) = s⋅t Degree of π ≤ n-1 : π(0) reconstructible from n shares

slide-67
SLIDE 67

BGW

Idea 2: Can move from linear secret-sharing scheme A to linear secret-sharing scheme B securely

slide-68
SLIDE 68

BGW

Idea 2: Can move from linear secret-sharing scheme A to linear secret-sharing scheme B securely Given shares (a1, …, an) ← ShareA(s) Share each ai using scheme B: (bi1,…,bin)← ShareB(ai) Locally each party j reconstructs using scheme A:
 bj ← ReconA (b1j,…,bnj)

slide-69
SLIDE 69

BGW

Idea 2: Can move from linear secret-sharing scheme A to linear secret-sharing scheme B securely Given shares (a1, …, an) ← ShareA(s) Share each ai using scheme B: (bi1,…,bin)← ShareB(ai) Locally each party j reconstructs using scheme A:
 bj ← ReconA (b1j,…,bnj) Claim: ReconB(b1,…,bn) = s

slide-70
SLIDE 70

BGW

Idea 2: Can move from linear secret-sharing scheme A to linear secret-sharing scheme B securely Given shares (a1, …, an) ← ShareA(s) Share each ai using scheme B: (bi1,…,bin)← ShareB(ai) Locally each party j reconstructs using scheme A:
 bj ← ReconA (b1j,…,bnj) Claim: ReconB(b1,…,bn) = s For any linear f, ReconB( f ( ShareB(a ̅ ) ) ) = f(a ̅ )

slide-71
SLIDE 71

BGW

Idea 2: Can move from linear secret-sharing scheme A to linear secret-sharing scheme B securely Given shares (a1, …, an) ← ShareA(s) Share each ai using scheme B: (bi1,…,bin)← ShareB(ai) Locally each party j reconstructs using scheme A:
 bj ← ReconA (b1j,…,bnj) Claim: ReconB(b1,…,bn) = s For any linear f, ReconB( f ( ShareB(a ̅ ) ) ) = f(a ̅ ) ReconA is a linear function

slide-72
SLIDE 72

Honest Majority

Can’ t tolerate (passive) corruption of n/2 parties unless functionality (passive) trivial for 2-party Can’ t tolerate active corruption of n/3 parties (even for “broadcast”) if guaranteed output delivery needed

slide-73
SLIDE 73

Honest Majority

Can’ t tolerate (passive) corruption of n/2 parties unless functionality (passive) trivial for 2-party Can’ t tolerate active corruption of n/3 parties (even for “broadcast”) if guaranteed output delivery needed More generally, guaranteed output delivery not possible if: set of parties can be partitioned into three sets, S1 ∪ S2 ∪ S3 such that S1, S2 (separately) may be passively corrupt, and S3 may be actively corrupt

slide-74
SLIDE 74

Active Security

Active security with abort: Run (passive-secure) BGW on an AMD circuit of the function Each party will accept the output only if the output verifies

slide-75
SLIDE 75

Active Security

Active security with abort: Run (passive-secure) BGW on an AMD circuit of the function Each party will accept the output only if the output verifies In IDEAL, adversary can cause selective abort, after seeing its own output

slide-76
SLIDE 76

Active Security

Active security with abort: Run (passive-secure) BGW on an AMD circuit of the function Each party will accept the output only if the output verifies In IDEAL, adversary can cause selective abort, after seeing its own output Guaranteed output-delivery possible using alternate methods

slide-77
SLIDE 77

Active Security

Active security with abort: Run (passive-secure) BGW on an AMD circuit of the function Each party will accept the output only if the output verifies In IDEAL, adversary can cause selective abort, after seeing its own output Guaranteed output-delivery possible using alternate methods Needs t < n/3. (Or t < n/2, but using a secure broadcast channel)

slide-78
SLIDE 78

Summary

slide-79
SLIDE 79

Summary

Using pair-wise OT (and no computational assumption)

slide-80
SLIDE 80

Summary

Using pair-wise OT (and no computational assumption) Passive security and Active security possible against arbitrarily many corruptions

slide-81
SLIDE 81

Summary

Using pair-wise OT (and no computational assumption) Passive security and Active security possible against arbitrarily many corruptions Using Broadcast channel and point-to-point channels

slide-82
SLIDE 82

Summary

Using pair-wise OT (and no computational assumption) Passive security and Active security possible against arbitrarily many corruptions Using Broadcast channel and point-to-point channels Active security (with guaranteed output delivery) possible against t < n/2 corruptions

slide-83
SLIDE 83

Summary

Using pair-wise OT (and no computational assumption) Passive security and Active security possible against arbitrarily many corruptions Using Broadcast channel and point-to-point channels Active security (with guaranteed output delivery) possible against t < n/2 corruptions Using only point-to-point channels

slide-84
SLIDE 84

Summary

Using pair-wise OT (and no computational assumption) Passive security and Active security possible against arbitrarily many corruptions Using Broadcast channel and point-to-point channels Active security (with guaranteed output delivery) possible against t < n/2 corruptions Using only point-to-point channels Passive security possible against t < n/2 corruptions

slide-85
SLIDE 85

Summary

Using pair-wise OT (and no computational assumption) Passive security and Active security possible against arbitrarily many corruptions Using Broadcast channel and point-to-point channels Active security (with guaranteed output delivery) possible against t < n/2 corruptions Using only point-to-point channels Passive security possible against t < n/2 corruptions Active security (with guaranteed output delivery) possible against t < n/3 corruptions