multi party computation with hybrid security matthias
play

Multi-Party Computation with Hybrid Security Matthias Fitzi, Thomas - PowerPoint PPT Presentation

Multi-Party Computation with Hybrid Security Matthias Fitzi, Thomas Holenstein, and J urg Wullschleger Multi-Party Computation (MPC)


  1. Multi-Party Computation with Hybrid Security Matthias Fitzi, Thomas Holenstein, and J¨ urg Wullschleger

  2. ✏ � ☛ ✌ ✌ ✌ � ✡ ✠ ✟ ✟ ✟ ✟ ✟ ✟ ✄ � ✂ � ✁ Multi-Party Computation (MPC) [Yao82,GMW87] �✞✝ �✆☎ �✎✍ ✁☞☛

  3. ✏ ✟ ✍ � ☛ ✌ ✌ ✌ � ✡ ✠ ✟ � ✟ ✟ ✟ ✄ � ✂ � ✁ MPC: Adversary �✆☎ �✞✝ ✁☞☛

  4. ✏ ✠ ✍ � ☛ ✌ ✌ ✌ � ✡ ✟ � ✁ MPC: Adversary Central adversary : – corrupt up to players actively – Privacy : no information about good � ✄✂ – Correctness : ✁☞☛

  5. ✂ ✁ ✆ ✄ � ✁ ✂ ✄ ☎ � MPC: General Achievability MPC achievable iff Standard model: Broadcast Model: x x x x x [BGW88,CCD88] [B89,RB89] tight [LSP82] tight [Cleve86]

  6. ✁ � ✁ ✂ � How to do Broadcast with ? Construction using: Hardware.

  7. ✁ � ✁ ✂ � How to do Broadcast with ? Construction using: Hardware. How???

  8. ✁ � ✁ ✂ � � How to do Broadcast with ? Construction using: Hardware. How??? Signature Scheme [LSP82,DS82,PW96]

  9. ✁ � ✁ ✂ � � How to do Broadcast with ? Construction using: Hardware. How??? Signature Scheme [LSP82,DS82,PW96] + Consistent PKI.

  10. ✟ ☎ ✟ ✟ ✟ ✟ ✝ � � ✄ � ✂ � ✁ � MPC with Signature Scheme ... ...

  11. ✁ � ✂ ✄ ☎ � ✁ ✂ ✄ ✆ MPC: Compare Models Standard model: Standard Model with Signature Scheme and consistent PKI:

  12. ✁ � ✂ ✄ ☎ � � ✁ MPC: Compare Models Standard model: Standard Model with Signature Scheme and consistent PKI: Adversary can forge Signature or make PKI inconsistent.

  13. � ✁ ✂ � ✁ � Model - Idea Adversary - can Forge Signature - can make PKI inkonsistent

  14. ✂ ✄ ☎ ✂ ✄ ✆ Model - Idea ? Adversary - can Forge Signature - can make PKI inkonsistent

  15. ✂ ✄ ☎ ✂ ✄ ✆ Model - Idea ? Adversary - can Forge Signature - can make PKI inkonsistent

  16. � ✁ � � ✁ � � Hybrid Security Model , ✁ ☎✂ ✁ ✁� ✁ ✄✂ A B C D Adversary can: corrupt up to players. if , forge signatures. if , make the PKI inconsistent. ✁ ☎✂

  17. ✂ � ✁ � � ✁ Previous Results: Tight Bounds T n 2 n 3 n n 3 3 n 2 n n t t p σ

  18. ✏ ✂ ✂ � ✁ � ✁ ✡ � � � ✏ ✄ ✡ � ✁ � ✂ � ✁ � ✁ � � � ✁ Tight Bounds for Hybrid Security T n 2 n 4 n 3 n n 3 3 n 2 n n t p t σ ✁ ✄✂

  19. ☛ ✁ � ☛ ✂ � ✁ � The Protocol - Idea MPC: [RB89] / [B89] ✁ ☎✂ Broadcast

  20. � � ✂ � ☛ � ✁ ☛ ✁ ✁ � ✂ ☛ � ✁ ☛ The Protocol - Idea MPC: [RB89] / [B89] ✁ ☎✂ Broadcast: [FM00] ✁ ☎✂ Weak Broadcast [Dolev82]

  21. ✏ ✂ � ✂ � ✁ � ✡ ✄ ✏ � ✂ � ✡ � ✁ � � ✂ ☛ � ☛ ✁ ☛ ✁ � ☛ ✁ � The Protocol - Idea MPC: [RB89] / [B89] ✁ ☎✂ Broadcast: [FM00] ✁ ☎✂ Weak Broadcast [this paper] ✁ ☎✂

  22. � � � � ✡ � � ✂ ✏ � ✄ ✡ � ✁ � ✂ ✁ ✂ ✏ � ☛ ✁ � ☛ ✟ ✂ ✁ � � ✟ ☛ ✁ � ☛ � The Protocol - Idea MPC: [RB89] / [B89] ✁ ☎✂ Broadcast: [FM00] ✁ ☎✂ Weak Broadcast [this paper] ✁ ☎✂ . . Weak Broadcast: .

  23. � Weak Broadcast - Protocol

  24. � � Weak Broadcast - Protocol

  25. � � � � � Weak Broadcast - Protocol

  26. � � � � � ✁ ✁ � � � � Weak Broadcast - Protocol

  27. � ✁ ✁ � � � � � ✁ ✁ � ✁ ✁ Weak Broadcast - Protocol

  28. ✟ ✝ ✝ � � ✁ ✝ ✁ ✞ � ✝ ✟ ✁ ✝ ✁ ✞ ✝ � ✟ ✞ ✠ ✝ ✁ ✁ ✁ � � � � � ✁ ✞ � ✁ ✁ ✁ ✠ � ✝ � ✄ Weak Broadcast - Protocol honest? ✁ ✄✂ ✁✂✁✄✁✄✁✂✁✄☎ Output , if: ✁ ✁� ✁✂✁✄✁✂✁✄✁✄✆ and otherwise.

  29. � ✁ ✁ � � ✁ � ✏ ✁ ✂ � � � ✡ ✄ ✏ � ✂ � � ✡ ✁ ✂ Conclusion MPC with Hybrid Security: Tight Bound: ✁ ☎✂ Trade-Off For Free! Efficient!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend