multi party computation with hybrid security matthias
play

Multi-Party Computation with Hybrid Security Matthias Fitzi, Thomas - PowerPoint PPT Presentation

Multi-Party Computation with Hybrid Security Matthias Fitzi, Thomas Holenstein, and J urg Wullschleger Multi-Party Computation (MPC)


  1. Multi-Party Computation with Hybrid Security Matthias Fitzi, Thomas Holenstein, and J¨ urg Wullschleger

  2. ✏ � ☛ ✌ ✌ ✌ � ✡ ✠ ✟ ✟ ✟ ✟ ✟ ✟ ✄ � ✂ � ✁ Multi-Party Computation (MPC) [Yao82,GMW87] �✞✝ �✆☎ �✎✍ ✁☞☛

  3. ✏ ✟ ✍ � ☛ ✌ ✌ ✌ � ✡ ✠ ✟ � ✟ ✟ ✟ ✄ � ✂ � ✁ MPC: Adversary �✆☎ �✞✝ ✁☞☛

  4. ✏ ✠ ✍ � ☛ ✌ ✌ ✌ � ✡ ✟ � ✁ MPC: Adversary Central adversary : – corrupt up to players actively – Privacy : no information about good � ✄✂ – Correctness : ✁☞☛

  5. ✂ ✁ ✆ ✄ � ✁ ✂ ✄ ☎ � MPC: General Achievability MPC achievable iff Standard model: Broadcast Model: x x x x x [BGW88,CCD88] [B89,RB89] tight [LSP82] tight [Cleve86]

  6. ✁ � ✁ ✂ � How to do Broadcast with ? Construction using: Hardware.

  7. ✁ � ✁ ✂ � How to do Broadcast with ? Construction using: Hardware. How???

  8. ✁ � ✁ ✂ � � How to do Broadcast with ? Construction using: Hardware. How??? Signature Scheme [LSP82,DS82,PW96]

  9. ✁ � ✁ ✂ � � How to do Broadcast with ? Construction using: Hardware. How??? Signature Scheme [LSP82,DS82,PW96] + Consistent PKI.

  10. ✟ ☎ ✟ ✟ ✟ ✟ ✝ � � ✄ � ✂ � ✁ � MPC with Signature Scheme ... ...

  11. ✁ � ✂ ✄ ☎ � ✁ ✂ ✄ ✆ MPC: Compare Models Standard model: Standard Model with Signature Scheme and consistent PKI:

  12. ✁ � ✂ ✄ ☎ � � ✁ MPC: Compare Models Standard model: Standard Model with Signature Scheme and consistent PKI: Adversary can forge Signature or make PKI inconsistent.

  13. � ✁ ✂ � ✁ � Model - Idea Adversary - can Forge Signature - can make PKI inkonsistent

  14. ✂ ✄ ☎ ✂ ✄ ✆ Model - Idea ? Adversary - can Forge Signature - can make PKI inkonsistent

  15. ✂ ✄ ☎ ✂ ✄ ✆ Model - Idea ? Adversary - can Forge Signature - can make PKI inkonsistent

  16. � ✁ � � ✁ � � Hybrid Security Model , ✁ ☎✂ ✁ ✁� ✁ ✄✂ A B C D Adversary can: corrupt up to players. if , forge signatures. if , make the PKI inconsistent. ✁ ☎✂

  17. ✂ � ✁ � � ✁ Previous Results: Tight Bounds T n 2 n 3 n n 3 3 n 2 n n t t p σ

  18. ✏ ✂ ✂ � ✁ � ✁ ✡ � � � ✏ ✄ ✡ � ✁ � ✂ � ✁ � ✁ � � � ✁ Tight Bounds for Hybrid Security T n 2 n 4 n 3 n n 3 3 n 2 n n t p t σ ✁ ✄✂

  19. ☛ ✁ � ☛ ✂ � ✁ � The Protocol - Idea MPC: [RB89] / [B89] ✁ ☎✂ Broadcast

  20. � � ✂ � ☛ � ✁ ☛ ✁ ✁ � ✂ ☛ � ✁ ☛ The Protocol - Idea MPC: [RB89] / [B89] ✁ ☎✂ Broadcast: [FM00] ✁ ☎✂ Weak Broadcast [Dolev82]

  21. ✏ ✂ � ✂ � ✁ � ✡ ✄ ✏ � ✂ � ✡ � ✁ � � ✂ ☛ � ☛ ✁ ☛ ✁ � ☛ ✁ � The Protocol - Idea MPC: [RB89] / [B89] ✁ ☎✂ Broadcast: [FM00] ✁ ☎✂ Weak Broadcast [this paper] ✁ ☎✂

  22. � � � � ✡ � � ✂ ✏ � ✄ ✡ � ✁ � ✂ ✁ ✂ ✏ � ☛ ✁ � ☛ ✟ ✂ ✁ � � ✟ ☛ ✁ � ☛ � The Protocol - Idea MPC: [RB89] / [B89] ✁ ☎✂ Broadcast: [FM00] ✁ ☎✂ Weak Broadcast [this paper] ✁ ☎✂ . . Weak Broadcast: .

  23. � Weak Broadcast - Protocol

  24. � � Weak Broadcast - Protocol

  25. � � � � � Weak Broadcast - Protocol

  26. � � � � � ✁ ✁ � � � � Weak Broadcast - Protocol

  27. � ✁ ✁ � � � � � ✁ ✁ � ✁ ✁ Weak Broadcast - Protocol

  28. ✟ ✝ ✝ � � ✁ ✝ ✁ ✞ � ✝ ✟ ✁ ✝ ✁ ✞ ✝ � ✟ ✞ ✠ ✝ ✁ ✁ ✁ � � � � � ✁ ✞ � ✁ ✁ ✁ ✠ � ✝ � ✄ Weak Broadcast - Protocol honest? ✁ ✄✂ ✁✂✁✄✁✄✁✂✁✄☎ Output , if: ✁ ✁� ✁✂✁✄✁✂✁✄✁✄✆ and otherwise.

  29. � ✁ ✁ � � ✁ � ✏ ✁ ✂ � � � ✡ ✄ ✏ � ✂ � � ✡ ✁ ✂ Conclusion MPC with Hybrid Security: Tight Bound: ✁ ☎✂ Trade-Off For Free! Efficient!

Recommend


More recommend