Round Optimal Secure Multiparty Computation from Minimal Assumptions - - PowerPoint PPT Presentation

β–Ά
round optimal secure multiparty computation from minimal
SMART_READER_LITE
LIVE PREVIEW

Round Optimal Secure Multiparty Computation from Minimal Assumptions - - PowerPoint PPT Presentation

Round Optimal Secure Multiparty Computation from Minimal Assumptions Arka Rai Choudhuri Michele Ciampi Vipul Goyal Johns Hopkins University The University of Edinburgh Carnegie Mellon University and NTT Research Abhishek Jain Rafail


slide-1
SLIDE 1

Round Optimal Secure Multiparty Computation from Minimal Assumptions

Arka Rai Choudhuri

Johns Hopkins University

Michele Ciampi

The University of Edinburgh

Vipul Goyal

Carnegie Mellon University and NTT Research

1

TCC 2020 Abhishek Jain

Johns Hopkins University

Rafail Ostrovsky

University of California Los Angeles

slide-2
SLIDE 2

Multiparty Computation (MPC)

[Yao’86, Goldreich-Micali-Wigderson’87]

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4

slide-3
SLIDE 3

Multiparty Computation (MPC)

[Yao’86, Goldreich-Micali-Wigderson’87]

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧

slide-4
SLIDE 4

Multiparty Computation (MPC)

[Yao’86, Goldreich-Micali-Wigderson’87]

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧

A round constitutes of every participant sending a message.

slide-5
SLIDE 5

Multiparty Computation (MPC)

[Yao’86, Goldreich-Micali-Wigderson’87]

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧

A round constitutes of every participant sending a message. Goal: For efficiency, minimize rounds of interaction.

slide-6
SLIDE 6

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧

Misbehaving participants should not learn anything beyond the output of the function.

slide-7
SLIDE 7

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧

slide-8
SLIDE 8

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧

real world

slide-9
SLIDE 9

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧

real world ideal world

slide-10
SLIDE 10

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑔

real world ideal world

slide-11
SLIDE 11

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

slide-12
SLIDE 12

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

slide-13
SLIDE 13

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

slide-14
SLIDE 14

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

slide-15
SLIDE 15

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

slide-16
SLIDE 16

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

Computational security.

slide-17
SLIDE 17

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

Computational security. Malicious adversaries with dishonest majority.

slide-18
SLIDE 18

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

Computational security. Malicious adversaries with dishonest majority. Black-box simulation.

slide-19
SLIDE 19

Security

𝑧 = 𝑔(𝑦1, 𝑦2, 𝑦3, 𝑦4) 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑦1 𝑦2 𝑦3 𝑦4 𝑧 𝑧 𝑧 𝑧 𝑔

real world ideal world

Computational security. Malicious adversaries with dishonest majority. Black-box simulation. No trusted setup.

slide-20
SLIDE 20

Can we construct round optimal multiparty computation from minimal assumptions?

9

slide-21
SLIDE 21

Timeline

21

slide-22
SLIDE 22

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87]

slide-23
SLIDE 23

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] constant round

slide-24
SLIDE 24

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] constant round

slide-25
SLIDE 25

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] 4 message impossible for 2PC constant round

slide-26
SLIDE 26

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] 4 message impossible for 2PC constant round

slide-27
SLIDE 27

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] 4 message impossible for 2PC constant round

slide-28
SLIDE 28

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] 4 message impossible for 2PC constant round

slide-29
SLIDE 29

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] 4 message impossible for 2PC constant round 5 message protocol for 2PC

slide-30
SLIDE 30

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] [Pass04, Smith03, Pass04, Pass Wee10, Wee10, Goyal11] 4 message impossible for 2PC constant round 5 message protocol for 2PC

slide-31
SLIDE 31

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] [Pass04, Smith03, Pass04, Pass Wee10, Wee10, Goyal11] [Garg-Mukherjee- Pandey- Polychroniadou16] 4 message impossible for 2PC constant round 5 message protocol for 2PC

slide-32
SLIDE 32

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] [Pass04, Smith03, Pass04, Pass Wee10, Wee10, Goyal11] [Garg-Mukherjee- Pandey- Polychroniadou16] 4 message impossible for 2PC 3 round impossible for MPC constant round 5 message protocol for 2PC

slide-33
SLIDE 33

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] [Pass04, Smith03, Pass04, Pass Wee10, Wee10, Goyal11] [Garg-Mukherjee- Pandey- Polychroniadou16] 4 message impossible for 2PC 3 round impossible for MPC 5 round protocol assuming iO constant round 5 message protocol for 2PC

slide-34
SLIDE 34

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] [Pass04, Smith03, Pass04, Pass Wee10, Wee10, Goyal11] [Garg-Mukherjee- Pandey- Polychroniadou16] 4 message impossible for 2PC 3 round impossible for MPC 5 round protocol assuming iO [Ananth-C-Jain17, Brakerski-Halevi- Polychroniadou17] 4 round protocol subexponential assumptions constant round 5 message protocol for 2PC

slide-35
SLIDE 35

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] [Pass04, Smith03, Pass04, Pass Wee10, Wee10, Goyal11] [Garg-Mukherjee- Pandey- Polychroniadou16] 4 message impossible for 2PC 3 round impossible for MPC 5 round protocol assuming iO [Ananth-C-Jain17, Brakerski-Halevi- Polychroniadou17] 4 round protocol subexponential assumptions [Badrinarayanan- Goyal-Jain-Kalai- Khurana-Sahai18, Halevi-Hazay- Polychroniadou- Venkitasubramaniam 18] 4 round protocol strong number theoretic assumptions constant round 5 message protocol for 2PC

slide-36
SLIDE 36

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] [Pass04, Smith03, Pass04, Pass Wee10, Wee10, Goyal11] [Garg-Mukherjee- Pandey- Polychroniadou16] 4 message impossible for 2PC 3 round impossible for MPC 5 round protocol assuming iO [Ananth-C-Jain17, Brakerski-Halevi- Polychroniadou17] 4 round protocol subexponential assumptions [Badrinarayanan- Goyal-Jain-Kalai- Khurana-Sahai18, Halevi-Hazay- Polychroniadou- Venkitasubramaniam 18] 4 round protocol strong number theoretic assumptions [Kilian88] Oblivious Transfer (OT) necessary and sufficient for MPC constant round 5 message protocol for 2PC

slide-37
SLIDE 37

Timeline

21

[Yao86, Goldreich- Micali- Wigderson87] [Beaver-Micali- Rogaway90] [Katz-Ostrovsky- Smith03] [Katz-Ostrovsky04] [Pass04, Smith03, Pass04, Pass Wee10, Wee10, Goyal11] [Garg-Mukherjee- Pandey- Polychroniadou16] 4 message impossible for 2PC 3 round impossible for MPC 5 round protocol assuming iO [Ananth-C-Jain17, Brakerski-Halevi- Polychroniadou17] 4 round protocol subexponential assumptions [Badrinarayanan- Goyal-Jain-Kalai- Khurana-Sahai18, Halevi-Hazay- Polychroniadou- Venkitasubramaniam 18] 4 round protocol strong number theoretic assumptions [Kilian88] [Benhamouda-Lin18] Oblivious Transfer (OT) necessary and sufficient for MPC 𝒍-round OT β‡’ 𝒍- round MPC, 𝒍 β‰₯ πŸ” constant round 5 message protocol for 2PC

slide-38
SLIDE 38

Our results

11

Assuming 4 round oblivious transfer (OT), there exists a 4 round MPC protocol.

slide-39
SLIDE 39

Our results

11

Assuming 4 round oblivious transfer (OT), there exists a 4 round MPC protocol.

OT: Indistinguishability security against malicious sender, and extraction of receiver bit.

OT protocols satisfying such properties are indeed known.

slide-40
SLIDE 40

Protecting the 4th round message

12

slide-41
SLIDE 41

Challenge: Enforcing Honest Behavior

13

𝑔

Any 4 round protocol computing a function 𝑔.

slide-42
SLIDE 42

Challenge: Enforcing Honest Behavior

14

𝑔

Rushing adversary

May decide not to send its message after it sees Bob’s message.

slide-43
SLIDE 43

Challenge: Enforcing Honest Behavior

14

𝑔

Rushing adversary

May decide not to send its message after it sees Bob’s message.

slide-44
SLIDE 44

Challenge: Enforcing Honest Behavior

  • utput

14

𝑔

Rushing adversary

May decide not to send its message after it sees Bob’s message.

Only Alice learns the

  • utput.
slide-45
SLIDE 45

Challenge: Enforcing Honest Behavior

  • utput

15

identity

Rushing adversary

May decide not to send its message after it sees Bob’s message.

slide-46
SLIDE 46

Challenge: Enforcing Honest Behavior

Bob’s input

16

identity

Rushing adversary

May decide not to send its message after it sees Bob’s message.

slide-47
SLIDE 47

Challenge: Enforcing Honest Behavior

Bob’s input

16

identity

Don’t send fourth round message unless Alice proves honest behavior.

Rushing adversary

May decide not to send its message after it sees Bob’s message.

slide-48
SLIDE 48

Don’t send fourth round message unless Alice proves honest behavior.

Challenge: Enforcing Honest Behavior

Bob’s input

17

identity

Typical approach: Alice convinces Bob of honest behavior via zero-knowledge proof before Bob sends his fourth round message.

slide-49
SLIDE 49

Don’t send fourth round message unless Alice proves honest behavior.

Challenge: Enforcing Honest Behavior

Bob’s input

17

identity

Typical approach: Alice convinces Bob of honest behavior via zero-knowledge proof before Bob sends his fourth round message. Requires 3 round zero-knowledge proofs [Goldreich-Krawczyk’96]: Impossible with Black-box simulation.

slide-50
SLIDE 50

Don’t send fourth round message unless Alice proves honest behavior.

Challenge: Enforcing Honest Behavior

Bob’s input

17

identity

Many other challenges, but for this talk, we focus on solving this challenge. Typical approach: Alice convinces Bob of honest behavior via zero-knowledge proof before Bob sends his fourth round message. Requires 3 round zero-knowledge proofs [Goldreich-Krawczyk’96]: Impossible with Black-box simulation.

slide-51
SLIDE 51

Interactive Multiparty Conditional Disclosure of Secret (MCDS)

18

slide-52
SLIDE 52

Conditional Disclosure of Secrets (CDS)

19

slide-53
SLIDE 53

Conditional Disclosure of Secrets (CDS)

20

message

slide-54
SLIDE 54

message

Conditional Disclosure of Secrets (CDS)

20

message

slide-55
SLIDE 55

message

Conditional Disclosure of Secrets (CDS)

20

witness + message

slide-56
SLIDE 56

message

Conditional Disclosure of Secrets (CDS)

20

witness message + =

If witness satisfies specified condition.

message

slide-57
SLIDE 57

message

Conditional Disclosure of Secrets (CDS)

20

witness message + =

If witness satisfies specified condition. [Gertner-Ishai-Kushilevitz-Malkin98, Aiello-Ishai-Reingold01]

message

slide-58
SLIDE 58

CDS as safety net

21

𝑔

slide-59
SLIDE 59

CDS as safety net

22

𝑔

slide-60
SLIDE 60

CDS as safety net

22

β€œI behaved honestly”

𝑔

slide-61
SLIDE 61

CDS as safety net

22

β€œI behaved honestly”

How do we prove honest behavior?

𝑔

slide-62
SLIDE 62

CDS as safety net

23

input and randomness

𝑔

slide-63
SLIDE 63

CDS as safety net

23

input and randomness

Does this work with more than 2 parties?

𝑔

slide-64
SLIDE 64

CDS as safety net

24

slide-65
SLIDE 65

CDS as safety net

25

input and randomness input and randomness

slide-66
SLIDE 66

CDS as safety net

26

input and randomness input and randomness

slide-67
SLIDE 67

CDS as safety net

27

everyone behaved honestly everyone behaved honestly

slide-68
SLIDE 68

CDS as safety net

27

everyone behaved honestly everyone behaved honestly

Want a public witness at the end of the fourth round.

Use 4 round zero- knowledge proofs.

slide-69
SLIDE 69

CDS as safety net

28

Want a public witness at the end of the fourth round.

Use 4 round zero- knowledge proofs.

𝜌𝐡 𝜌𝐢 𝜌𝐡 𝜌𝐢 𝜌𝐡 𝜌𝐢

slide-70
SLIDE 70

Implementing CDS?

29

𝜌𝐡 𝜌𝐢 𝜌𝐡 𝜌𝐢 𝜌𝐡 𝜌𝐢

We want to build a CDS based on OT. Only known non-interactive realization is Witness Encryption, which is known assuming Indistinguishability Obfuscation (iO).

slide-71
SLIDE 71

Interactive Multiparty CDS (MCDS)

30

slide-72
SLIDE 72

Interactive Multiparty CDS (MCDS)

Oblivious Transfer (OT)

30

slide-73
SLIDE 73

Interactive Multiparty CDS (MCDS)

Oblivious Transfer (OT) Garbled Circuit

30

slide-74
SLIDE 74

Oblivious Transfer (OT) Garbled Circuit

31

Interactive Multiparty CDS (MCDS)

slide-75
SLIDE 75

Interactive Multiparty CDS (MCDS)

Oblivious Transfer (OT) Garbled Circuit

32

receiver sender

𝑐 𝑦0, 𝑦1 1-out-of-2 OT [Even-Goldreich-Lempel’82]

slide-76
SLIDE 76

Interactive Multiparty CDS (MCDS)

Oblivious Transfer (OT) Garbled Circuit

32

receiver sender

𝑐 𝑦0, 𝑦1 𝑦𝑐 1-out-of-2 OT [Even-Goldreich-Lempel’82]

slide-77
SLIDE 77

Interactive Multiparty CDS (MCDS)

Oblivious Transfer (OT) Garbled Circuit

33

circuit input

slide-78
SLIDE 78

Interactive Multiparty CDS (MCDS)

Oblivious Transfer (OT) Garbled Circuit

33

circuit input input garble

slide-79
SLIDE 79

Interactive Multiparty CDS (MCDS)

Oblivious Transfer (OT) Garbled Circuit

34

circuit garble input input

slide-80
SLIDE 80

Interactive MCDS

35

Input: witness if witness satisfies condition,

  • utput message

receiver sender witness message

slide-81
SLIDE 81

Interactive MCDS

36

receiver sender witness message

slide-82
SLIDE 82

Interactive MCDS

37

receiver sender witness message

slide-83
SLIDE 83

Interactive MCDS

38

receiver sender witness message

slide-84
SLIDE 84

Interactive MCDS

39

receiver sender witness message

slide-85
SLIDE 85

Interactive MCDS to protect 4th round

40

slide-86
SLIDE 86

Interactive MCDS to protect 4th round

40

𝜌1 𝜌2 𝜌3

β‹―

slide-87
SLIDE 87

Interactive MCDS to protect 4th round

41

𝜌1 𝜌2 𝜌3

β‹―

garbled circuit

slide-88
SLIDE 88

Interactive MCDS to protect 4th round

41

𝜌1 𝜌2 𝜌3

β‹―

garbled circuit

OT

slide-89
SLIDE 89

Interactive MCDS to protect 4th round

41

𝜌1 𝜌2 𝜌3

β‹―

garbled circuit

OT OT receiver input must be decided by the 3rd round

  • f the OT.
slide-90
SLIDE 90

Interactive MCDS to protect 4th round

41

𝜌1 𝜌2 𝜌3

β‹―

garbled circuit

Requires 3 round zero-knowledge proofs! OT OT receiver input must be decided by the 3rd round

  • f the OT.
slide-91
SLIDE 91

Weakened Requirement from ZK proof?

42

𝜌1 𝜌2 𝜌3

β‹―

garbled circuit

OT

Requires 3 round zero-knowledge proofs!

slide-92
SLIDE 92

Weakened Requirement from ZK proof?

42

𝜌1 𝜌2 𝜌3

β‹―

garbled circuit

OT

Requires 3 round zero-knowledge proofs!

  • 1. ZK in the simultaneous

message model.

slide-93
SLIDE 93

Weakened Requirement from ZK proof?

42

𝜌1 𝜌2 𝜌3

β‹―

garbled circuit

OT

Requires 3 round zero-knowledge proofs!

  • 1. ZK in the simultaneous

message model.

  • 2. The third round of the ZK

proof hidden until the fourth round of MPC.

Remains hidden if Bob aborts in the third round. Essentially repurposing a three round protocol to work in four rounds.

slide-94
SLIDE 94

Weakened Requirement from ZK proof?

42

𝜌1 𝜌2 𝜌3

β‹―

garbled circuit

OT

Requires 3 round zero-knowledge proofs!

  • 1. ZK in the simultaneous

message model.

  • 2. The third round of the ZK

proof hidden until the fourth round of MPC.

Remains hidden if Bob aborts in the third round. Essentially repurposing a three round protocol to work in four rounds.

Promise Zero-Knowledge [Badrinarayanan-Goyal-Jain-Kalai-Khurana-Sahai18]

Assuming OT, there exists a 3 round zero-knowledge protocol in the simultaneous message model secure against verifiers who do not abort.

slide-95
SLIDE 95

Weakened Requirement from ZK proof?

43

𝜌1 𝜌2 𝜌3

β‹―

OT

  • 1. ZK in the simultaneous

message model.

  • 2. The third round of the ZK

proof hidden until the fourth round of MPC.

Remains hidden if Bob aborts in the third round. Essentially repurposing a three round protocol to work in four rounds.

Promise Zero-Knowledge [Badrinarayanan-Goyal-Jain-Kalai-Khurana-Sahai18]

Assuming OT, there exists a 3 round zero-knowledge protocol in the simultaneous message model secure against verifiers who do not abort.

interactive

MCDS

Promise ZK

slide-96
SLIDE 96

Putting it together in the multiparty setting

44

𝜌𝐡 𝜌𝐢 𝜌𝐡 𝜌𝐢 𝜌𝐡 𝜌𝐢

slide-97
SLIDE 97

Putting it together in the multiparty setting

45

𝜌𝐡 𝜌𝐢 interactive

MCDS

slide-98
SLIDE 98

Putting it together in the multiparty setting

45

𝜌𝐡 𝜌𝐢 interactive

MCDS Receive Carol’s fourth round message if Promise ZK proofs of Alice and Bob verify.

Nobody receives Carol’s message if even one party cheats.

slide-99
SLIDE 99

Towards a Full Protocol

Many moving components in the final protocol.

46

slide-100
SLIDE 100

Towards a Full Protocol

Many moving components in the final protocol. Non-malleability challenges in limited rounds.

46

slide-101
SLIDE 101

Towards a Full Protocol

Many moving components in the final protocol. Non-malleability challenges in limited rounds. Black-box simulation requires rewinding the adversary.

Eg: used to extract adversary’s input. Primitives need to be secure in the presence of rewinds.

46

slide-102
SLIDE 102

Towards a Full Protocol

Many moving components in the final protocol. Non-malleability challenges in limited rounds. Black-box simulation requires rewinding the adversary.

Eg: used to extract adversary’s input. Primitives need to be secure in the presence of rewinds.

46

[New!] Assuming regular OT, we construct an OT protocol that retains security guarantees in the presence of a bounded number of rewinds.

slide-103
SLIDE 103

Bounded Rewind Secure OT

High level idea

47

slide-104
SLIDE 104

𝑙-Bounded Rewind Security

48

challenger

Regular challenger-adversary game

slide-105
SLIDE 105

𝑙-Bounded Rewind Security

49

challenger

𝑗

𝑗

𝑗 ∈ [𝑙 + 1]

Bounded rewind challenger-adversary game

slide-106
SLIDE 106

50

4 round 1-Rewind Secure OT

receiver sender

𝑐 𝑦0, 𝑦1

Receiver input should be hidden from an adversarial sender that can rewind the receiver once.

slide-107
SLIDE 107

51

4 round 1-Rewind Secure OT

receiver sender

𝑐 𝑦0, 𝑦1

Run two parallel copies of the OT. The receiver picks a random OT in the third round to proceed.

slide-108
SLIDE 108

52

4 round 1-Rewind Secure OT

receiver sender

𝑐 𝑦0, 𝑦1

Run two parallel copies of the OT. The receiver picks a random OT in the third round to proceed.

slide-109
SLIDE 109

52

4 round 1-Rewind Secure OT

receiver sender

𝑐 𝑦0, 𝑦1

Run two parallel copies of the OT. The receiver picks a random OT in the third round to proceed.

slide-110
SLIDE 110

52

4 round 1-Rewind Secure OT

receiver sender

𝑐 𝑦0, 𝑦1

Run two parallel copies of the OT. The receiver picks a random OT in the third round to proceed.

slide-111
SLIDE 111

53

4 round 1-Rewind Secure OT

receiver sender

𝑐 𝑦0, 𝑦1

Challenger can use a different instance in the two executions (one rewind).

slide-112
SLIDE 112

54

4 round 1-Rewind Secure OT

receiver sender

𝑐 𝑦0, 𝑦1

Challenger can use a different instance in the two executions (one rewind).

Leads to biased transcripts!

Challenger’s choice in one execution determines the choice in the other.

slide-113
SLIDE 113

55

4 round 1-Rewind Secure OT

receiver sender

𝑐 = 𝑐1 βŠ• 𝑐2 𝑦0, 𝑦1

High level idea: secret share receiver input

slide-114
SLIDE 114

55

4 round 1-Rewind Secure OT

receiver sender

𝑐 = 𝑐1 βŠ• 𝑐2 𝑦0, 𝑦1

𝑐1 High level idea: secret share receiver input

slide-115
SLIDE 115

55

4 round 1-Rewind Secure OT

receiver sender

𝑐 = 𝑐1 βŠ• 𝑐2 𝑦0, 𝑦1

𝑐1 𝑐2 High level idea: secret share receiver input

slide-116
SLIDE 116

55

4 round 1-Rewind Secure OT

receiver sender

𝑐 = 𝑐1 βŠ• 𝑐2 𝑦0, 𝑦1

𝑐1 𝑐2 In each execution, the challenger independently samples which instance to use for every index.

Secure if at least one index results in two different executions. Can be amplified.

High level idea: secret share receiver input

slide-117
SLIDE 117

56

4 round 1-Rewind Secure OT

receiver sender

𝑐 = 𝑐1 βŠ• 𝑐2 𝑦0, 𝑦1

𝑐1 𝑐2 In each execution, the challenger independently samples which instance to use for every index.

Secure if at least one index results in two different executions. Can be amplified. High level idea: details missing.

High level idea: secret share receiver input

slide-118
SLIDE 118

57

Assuming 4 round oblivious transfer (OT), there exists a 4 round MPC protocol.

slide-119
SLIDE 119

Thank you. Questions?

Arka Rai Choudhuri achoud@cs.jhu.edu

58

ia.cr/2019/216

Assuming 4 round oblivious transfer (OT), there exists a 4 round MPC protocol.