Sciweavers

ASIACRYPT
2008
Springer

MPC vs. SFE : Unconditional and Computational Security

13 years 6 months ago
MPC vs. SFE : Unconditional and Computational Security
Abstract. In secure computation among a set P of players one considers an adversary who can corrupt certain players. The three usually considered types of corruption are active, passive, and fail corruption. The adversary's corruption power is characterized by a so-called adversary structure which enumerates the adversary's corruption options, each option being a triple (A, E, F) of subsets of P, where the adversary can actively corrupt the players in A, passively corrupt the players in E, and fail-corrupt the players in F. This paper is concerned with characterizing for which adversary structures general secure function evaluation (SFE) and secure (reactive) multi-party computation (MPC) is possible, in various models. This has been achieved so far only for the very special model of perfect security, where, interestingly, the conditions for SFE and MPC are distinct. Such a separation was first observed by Ishai et al. in the context of computational security. We give the exa...
Martin Hirt, Ueli M. Maurer, Vassilis Zikas
Added 18 Oct 2010
Updated 18 Oct 2010
Type Conference
Year 2008
Where ASIACRYPT
Authors Martin Hirt, Ueli M. Maurer, Vassilis Zikas
Comments (0)