Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2016/976

On Adaptively Secure Multiparty Computation with a Short CRS

Ran Cohen and Chris Peikert

Abstract

In the setting of multiparty computation, a set of mutually distrusting parties wish to securely compute a joint function of their private inputs. A protocol is adaptively secure if honest parties might get corrupted \emph{after} the protocol has started. Recently (TCC 2015) three constant-round adaptively secure protocols were presented [CGP15, DKR15, GP15]. All three constructions assume that the parties have access to a \emph{common reference string} (CRS) whose size depends on the function to compute, even when facing semi-honest adversaries. It is unknown whether constant-round adaptively secure protocols exist, without assuming access to such a CRS. In this work, we study adaptively secure protocols which only rely on a short CRS that is independent on the function to compute. First, we raise a subtle issue relating to the usage of \emph{non-interactive non-committing encryption} within security proofs in the UC framework, and explain how to overcome it. We demonstrate the problem in the security proof of the adaptively secure oblivious-transfer protocol from [CLOS02] and provide a complete proof of this protocol. Next, we consider the two-party setting where one of the parties has a polynomial-size input domain, yet the other has no constraints on its input. We show that assuming the existence of adaptively secure oblivious transfer, every deterministic functionality can be computed with adaptive security in a constant number of rounds. Finally, we present a new primitive called \emph{non-committing indistinguishability obfuscation}, and show that this primitive is \emph{complete} for constructing adaptively secure protocols with round complexity independent of the function.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Minor revision. SCN 2016
DOI
10.1007/978-3-319-44618-9_7
Keywords
secure multiparty computationadaptive securitynon-committing encryptionround complexity
Contact author(s)
cohenran @ tauex tau ac il
History
2016-10-12: received
Short URL
https://ia.cr/2016/976
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/976,
      author = {Ran Cohen and Chris Peikert},
      title = {On Adaptively Secure Multiparty Computation with a Short {CRS}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/976},
      year = {2016},
      doi = {10.1007/978-3-319-44618-9_7},
      url = {https://eprint.iacr.org/2016/976}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.