Title :
How to play almost any mental game over the net - concurrent composition via super-polynomial simulation
Author :
Barak, Boaz ; Sahai, Amit
Author_Institution :
Dept. of Comput. Sci., Princeton Univ., NJ, USA
Abstract :
We construct a secure protocol for any multiparty functionality that remains secure (under a relaxed definition of security introduced by Prabhakaran and Sahai (STOC \´04)) when executed concurrently with multiple copies of itself and other protocols, without any assumptions on existence of trusted parties, common reference string, honest majority or synchronicity of the network. The relaxation of security is obtained by allowing the ideal-model simulator to run in quasipolynomial (as opposed to polynomial) time. Quasipolynomial simulation suffices to ensure security for most applications of multiparty computation. Furthermore, Lindell (FOCS \´03, TCC\´ 04) recently showed that such a protocol is impossible to obtain under the more standard definition of polynomial-time simulation by an ideal adversary. Our construction is the first such protocol under reasonably standard cryptographic assumptions (i.e., existence of a hash function collection that is collision resistent with respect to circuits of subexponential size, and existence of trapdoor permutations which are secure with respect to circuits of quasi-polynomial size). We introduce a new technique: "protocol condensing". That is, taking a protocol that has strong security properties but requires super-polynomial communication and computation, and then transforming it into a protocol with polynomial communication and computation, that still inherits the strong security properties of the original protocol. Our result is obtained by combining this technique with previous techniques of Canetti, Lindell, Ostrovsky, and Sahai (STOC \´02) and Pass (STOC \´04).
Keywords :
computational complexity; cryptography; protocols; ideal-model simulator; multiparty computation; multiparty functionality; polynomial-time simulation; protocol condensing; quasipolynomial simulation; quasipolynomial time; secure protocol; super-polynomial simulation; superpolynomial communication; superpolynomial computation; Circuits; Computational modeling; Computer science; Computer simulation; Cryptographic protocols; Cryptography; Nominations and elections; Polynomials; Security; Voting;
Conference_Titel :
Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on
Print_ISBN :
0-7695-2468-0
DOI :
10.1109/SFCS.2005.43