Skip to main content

2013 | OriginalPaper | Buchkapitel

A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation

verfasst von : Martin Hirt, Ueli Maurer, Christoph Lucas

Erschienen in: Advances in Cryptology – CRYPTO 2013

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

At STOC ’87, Goldreich et al. presented two protocols for secure multi-party computation (MPC) among

n

parties: The first protocol provides

passive

security against

t

 < 

n

corrupted parties. The second protocol provides even

active

security, but only against

t

 < 

n

/2 corrupted parties. Although these protocols provide security against the provably highest possible number of corruptions, each of them has its limitation: The first protocol is rendered completely insecure in presence of a single active corruption, and the second protocol is rendered completely insecure in presence of ⌈

n

/2 ⌉ passive corruptions.

At Crypto 2006, Ishai et al. combined these two protocols into a single protocol which provides passive security against

t

 < 

n

corruptions and active security against

t

 < 

n

/2 corruptions. This protocol unifies the security guarantees of the passive world and the active world (“best of both worlds”). However, the corruption threshold

t

 < 

n

can be tolerated only when

all

corruptions are passive. With a single active corruption, the threshold is reduced to

t

 < 

n

/2.

As our main result, we introduce a

dynamic tradeoff

between active and passive corruptions: We present a protocol which provides security against

t

 < 

n

passive corruptions, against

t

 < 

n

/2 active corruptions,

and everything in between

. In particular, our protocol provides full security against

k

active corruptions, as long as less than

n

 − 

k

parties are corrupted in total, for any unknown

k

.

The main technical contribution is a new secret sharing scheme that, in the reconstruction phase, releases secrecy

gradually

. This allows to construct non-robust MPC protocols which, in case of an abort, still provide some level of secrecy. Furthermore, using similar techniques, we also construct protocols for reactive MPC with hybrid security, i.e., different thresholds for secrecy, correctness, robustness, and fairness. Intuitively, the more corrupted parties, the less security is guaranteed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Metadaten
Titel
A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation
verfasst von
Martin Hirt
Ueli Maurer
Christoph Lucas
Copyright-Jahr
2013
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-40084-1_12