DocumentCode :
3593579
Title :
Realizing secure multiparty computation on incomplete networks
Author :
Vaya, Shailesh
Author_Institution :
Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai 600036, India
fYear :
2010
Firstpage :
1
Lastpage :
8
Abstract :
Secure multiparty computation of a multivariate function is a central problem in cryptography. It is well known that secure multiparty computation can be realized by a set of n parties iff the connectivity of the underlying (authenticated) communication network is more than twice the number of corrupted parties. This impossibility result makes secure multiparty computation far less applicable in practice, as most deployed networks have a degree much lower than O(n) and one would ideally like to be able to tolerate Θ(n) corrupted parties. In this work we consider a recently proposed model for (Unconditional) secure multiparty computation for networks of low degrees for which authenticated channels are available only between very few pairs of parties. Not all honest parties may be expected to achieve traditional security guarantees of multiparty computation for this model because of theoretical limitations posed by lack of infrastructure. Honest parties which are not given canonical guarantees of Correctness and Privacy are called ”sacrificed” and the resulting notion is called almost everywhere secure computation. In this conceptual note, we investigate the previous results about this model by Garay and Ostrovsky´2008. We explain why these results hold only for weak honest-but-curious type passive corruptions. We emphasize why the results for almost everywhere secure computation are theoretically interesting and practically relevant only when active malicious corruptions are allowed. We argue the limitation of hybrid argument for realizing privacy property when Byzantine corruptions are allowed. From this we deduce that simulation based reduction approach is necessary to realize even input indistinguishability type definition of privacy for the stand alone setting. We present a conceptual exposition of the simulator based approach for defining privacy of a.e.s.c. Finally, we present a brief overview of technicalities involved in realizing a.e- - .s.c. when malicious corruptions are allowed.
Keywords :
Computational modeling; Cryptography; Integrated circuits; Privacy; Protocols; Random variables; Almost everywhere secure computation; Byzantine adversary; Hybrid argument; Incomplete networks; Input indistinguishability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on
Electronic_ISBN :
978-989-8425-18-8
Type :
conf
Filename :
5741698
Link To Document :
بازگشت