Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2016/611

Catching MPC Cheaters: Identification and Openability

Robert Cunningham, Benjamin Fuller, and Sophia Yakoubov

Abstract

Secure multi-party computation (MPC) protocols do not completely prevent malicious parties from cheating or disrupting the computation. We augment MPC with three new properties to discourage cheating. First is a strengthening of identifiable abort, called completely identifiable abort, where all parties who do not follow the protocol will be identified as cheaters by each honest party. The second is completely identifiable auditability, which means that a third party can determine whether the computation was performed correctly (and who cheated if it was not). The third is openability, which means that a distinguished coalition of parties can recover the MPC inputs. We construct the first (efficient) MPC protocol achieving these properties. Our scheme is built on top of the SPDZ protocol (Damgard et al., Crypto 2012), which leverages an offline (computation-independent) pre-processing phase to speed up the online computation. Our protocol is optimistic, retaining online SPDZ efficiency when no one cheats. If cheating does occur, each honest party performs only local computation to identify cheaters. Our main technical tool is a new locally identifiable secret sharing scheme (as defined by Ishai, Ostrovsky, and Zikas (TCC 2012)) which we call commitment enhanced secret sharing or CESS. The work of Baum, Damgard, and Orlandi (SCN 2014) introduces the concept of auditability, which allows a third party to verify that the computation was executed correctly, but not to identify the cheaters if it was not. We enable the third party to identify the cheaters by augmenting the scheme with CESS. We add openability through the use of verifiable encryption and specialized zero-knowledge proofs.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. ICITS 2017
Keywords
cryptographic protocolsmulti-party computation
Contact author(s)
sonka @ bu edu
History
2017-10-12: revised
2016-06-14: received
See all versions
Short URL
https://ia.cr/2016/611
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/611,
      author = {Robert Cunningham and Benjamin Fuller and Sophia Yakoubov},
      title = {Catching {MPC} Cheaters: Identification and Openability},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/611},
      year = {2016},
      url = {https://eprint.iacr.org/2016/611}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.