A Simpler Variant of Universally Composable Security for Standard Multi Party Computation
Chlo´ e H´ ebant
Ecole Normale Sup´ erieure
February 22, 2018
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 1 / 18
A Simpler Variant of Universally Composable Security for Standard - - PowerPoint PPT Presentation
A Simpler Variant of Universally Composable Security for Standard Multi Party Computation Chlo e H ebant Ecole Normale Sup erieure February 22, 2018 Chlo e H ebant (ENS) Working Group: SUC Security February 22, 2018 1 / 18
Ecole Normale Sup´ erieure
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 1 / 18
1
2
3
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 2 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 3 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 3 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 3 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 3 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 3 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 3 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 4 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 4 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 4 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 4 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 4 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 4 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 4 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 5 / 18
Introduction Definition
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 5 / 18
Introduction Interest
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 6 / 18
Introduction Interest
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 6 / 18
Introduction Interest
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 6 / 18
Introduction Interest
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 7 / 18
Introduction Interest
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 7 / 18
Introduction Interest
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 7 / 18
Introduction Difficulties
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 8 / 18
Introduction Difficulties
STM proceeds as follows:
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 8 / 18
Introduction Difficulties
STM proceeds as follows:
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 8 / 18
Introduction Difficulties
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 9 / 18
SUC Model
1
2
3
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 10 / 18
SUC Model Communication model and rules
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 11 / 18
SUC Model Communication model and rules
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 11 / 18
SUC Model Communication model and rules
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 11 / 18
SUC Model Communication model and rules
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 11 / 18
SUC Model π SUC-securely computes F
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 12 / 18
SUC Model SUC composition theorem
πρ,S,Z(n, z) = 1] − Pr[SUC-HYBRIDF π,A,Z(n, z) = 1]
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 13 / 18
SUC Model SUC composition theorem
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 14 / 18
SUC Model SUC composition theorem
F F F
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 14 / 18
SUC Model SUC composition theorem
F F F
G G
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 14 / 18
SUC Model SUC composition theorem
F F F
G G
G G G
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 14 / 18
Conclusion
1
2
3
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 15 / 18
Conclusion
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 16 / 18
Conclusion
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 17 / 18
Conclusion
Chlo´ e H´ ebant (ENS) Working Group: SUC Security February 22, 2018 18 / 18