[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-031-56235-8_1guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Threshold-Optimal MPC with Friends and Foes

Published: 29 March 2024 Publication History

Abstract

Alon et al. (Crypto 2020) initiated the study of MPC with Friends and Foes (FaF) security, which captures the desirable property that even up to h honest parties should learn nothing additional about other honest parties’ inputs, even if the t corrupt parties send them extra information. Alon et al. describe two flavors of FaF security: weak FaF, where the simulated view of up to h honest parties should be indistinguishable from their real view, and strong FaF, where the simulated view of the honest parties should be indistinguishable from their real view even in conjunction with the simulated/real view of the corrupt parties. They give several initial FaF constructions with guaranteed output delivery (GOD); however, they leave some open problems. Their only construction which supports the optimal corruption bounds of 2t+h<n (where n denotes the number of parties) only offers weak FaF security and takes much more than the optimal three rounds of communication. In this paper, we describe two new constructions with GOD, both of which support 2t+h<n. Our first construction, based on threshold FHE, is the first three-round construction that matches this optimal corruption bound (though it only offers weak FaF security). Our second construction, based on a variant of BGW, is the first such construction that offers strong FaF security (though it requires more than three rounds, as well as correlated randomness). Our final contribution is further exploration of the relationship between FaF security and similar security notions. In particular, we show that FaF security does not imply mixed adversary security (where the adversary can make t active and h passive corruptions), and that Best of Both Worlds security (where the adversary can make t active or t+h passive corruptions, but not both) is orthogonal to both FaF and mixed adversary security.

References

[1]
Alon, B., Omri, E., Paskin-Cherniavsky, A.: MPC with friends and foes. In: Micciancio, D., Ristenpart, T. (eds.) Advances in Cryptology – CRYPTO 2020. CRYPTO 2020. LNCS, vol. 12171, pp. 677–706. Springer, Cham (2020).
[2]
Asharov, G., Jain, A., López-Alt, A., Tromer, E., Vaikuntanathan, V., Wichs, D.: Multiparty computation with low communication, computation and interaction via threshold FHE. In: Pointcheval, D., Johansson, T. (eds.) Advances in Cryptology – EUROCRYPT 2012. EUROCRYPT 2012. LNCS, vol. 7237, pp. 483–501. Springer, Berlin, Heidelberg (2012).
[3]
Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) Advances in Cryptology – CRYPTO ’91. CRYPTO 1991. LNCS, vol. 576, pp. 420–432. Springer, Berlin, Heidelberg (1992).
[4]
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: 20th ACM STOC, pp. 1–10. ACM Press, May 1988.
[5]
Boneh, D., et al.: Threshold cryptosystems from threshold fully homomorphic encryption. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology – CRYPTO 2018. CRYPTO 2018. LNCS, vol. 10991, pp. 565–596. Springer, Cham (2018).
[6]
Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: 34th ACM STOC, pp. 494–503. ACM Press, May 2002.
[7]
Dalskov, A.P.K., Escudero, D., Keller, M.: Fantastic four: Honest-majority four-party secure computation with malicious security. In: Bailey, M., Greenstadt, R. (eds.) USENIX Security 2021, pp. 2183–2200. USENIX Association, August 2021
[8]
Damgård, I., Nielsen, J.B.: Adaptive versus static security in the UC model. In: Chow, S.S.M., Liu, J.K., Hui, L.C.K., Yiu, S.M. (eds.) Provable Security. ProvSec 2014. LNCS, vol. 8782, pp. 10–28. Springer, Cham (2014).
[9]
Gennaro, R., Ishai, Y., Kushilevitz, E., Rabin, T.: On 2-round secure multiparty computation. In: Yung, M. (ed.) Advances in Cryptology – CRYPTO 2002. CRYPTO 2002. LNCS, vol. 2442, pp. 178–193. Springer, Berlin, Heidelberg (2002).
[10]
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Aho, A. (ed.) 19th ACM STOC, pp. 218–229. ACM Press, May 1987.
[11]
Gordon, S.D., Liu, F.H., Shi, E.: Constant-round MPC with fairness and guarantee of output delivery. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology – CRYPTO 2015. CRYPTO 2015. LNCS, vol. 9216, pp. 63–82. Springer, Berlin, Heidelberg (2015).
[12]
Hegde, A., Koti, N., Kukkala, V.B., Patil, S., Patra, A., Paul, P.: Attaining GOD beyond honest majority with friends and foes. In: Agrawal, S., Lin, D. (eds.) Advances in Cryptology – ASIACRYPT 2022. ASIACRYPT 2022. LNCS, vol. 13791, pp. 556–587. Springer, Cham (2022).
[13]
Ishai, Y., Kumaresan, R., Kushilevitz, E., Paskin-Cherniavsky, A.: Secure computation with minimal interaction, revisited. In: Gennaro, R., Robshaw, M. (eds.) Advances in Cryptology – CRYPTO 2015. CRYPTO 2015. LNCS, vol. 9216, pp. 359–378. Springer, Berlin, Heidelberg (2015).
[14]
Ishai, Y., Kushilevitz, E., Lindell, Y., Petrank, E.: On combining privacy with guaranteed output delivery in secure multiparty computation. In: Dwork, C. (ed.) Advances in Cryptology – CRYPTO 2006. CRYPTO 2006. LNCS, vol. 4117, pp. 483–500. Springer, Berlin, Heidelberg (2006).
[15]
Ishai, Y., Kushilevitz, E., Paskin, A.: Secure multiparty computation with minimal interaction. In: Rabin, T. (ed.) Advances in Cryptology – CRYPTO 2010. CRYPTO 2010. LNCS, vol. 6223, pp. 577–594. Springer, Berlin, Heidelberg (2010).
[16]
Katz, J.: On achieving the best of both worlds in secure multiparty computation. In: Johnson, D.S., Feige, U. (eds.) 39th ACM STOC, pp. 11–20. ACM Press, June 2007.
[17]
Koti, N., Kukkala, V.B., Patra, A., Gopal, B.R.: PentaGOD: stepping beyond traditional GOD with five parties. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022, pp. 1843–1856. ACM Press, November 2022.
[18]
Koti, N., Pancholi, M., Patra, A., Suresh, A.: SWIFT: super-fast and robust privacy-preserving machine learning. In: Bailey, M., Greenstadt, R. (eds.) USENIX Security 2021, pp. 2651–2668. USENIX Association, August 2021
[19]
Koti, N., Patra, A., Rachuri, R., Suresh, A.: Tetrad: Actively secure 4PC for secure training and inference. Cryptology ePrint Archive, Report 2021/755 (2021). https://eprint.iacr.org/2021/755
[20]
Melissaris, N., Ravi, D., Yakoubov, S.: Threshold-optimal MPC with friends and foes. Cryptology ePrint Archive, Paper 2022/1526 (2022). https://eprint.iacr.org/2022/1526
[21]
Patra, A., Ravi, D.: On the exact round complexity of secure three-party computation. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology – CRYPTO 2018. CRYPTO 2018. LNCS, vol. 10992, pp. 425–458. Springer, Cham (2018).
[22]
Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: 27th FOCS, pp. 162–167. IEEE Computer Society Press, October 1986.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Progress in Cryptology – INDOCRYPT 2023: 24th International Conference on Cryptology in India, Goa, India, December 10–13, 2023, Proceedings, Part II
Dec 2023
276 pages
ISBN:978-3-031-56234-1
DOI:10.1007/978-3-031-56235-8
  • Editors:
  • Anupam Chattopadhyay,
  • Shivam Bhasin,
  • Stjepan Picek,
  • Chester Rebeiro

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 29 March 2024

Author Tags

  1. Secure Computation
  2. Friends and Foes
  3. Guaranteed Output Delivery
  4. Round Complexity

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media