Sciweavers

Share
TCC
2016
Springer

Characterization of Secure Multiparty Computation Without Broadcast

3 years 4 months ago
Characterization of Secure Multiparty Computation Without Broadcast
A major challenge in the study of cryptography is characterizing the necessary and sufficient assumptions required to carry out a given cryptographic task. The focus of this work is the necessity of a broadcast channel for securely computing symmetric functionalities (where all the parties receive the same output) when one third of the parties, or more, might be corrupted. Assuming all parties are connected via a peer-to-peer network, but no broadcast channel (nor a secure setup phase) is available, we prove the following characterization: • A symmetric n-party functionality can be securely computed facing n/3 ≤ t < n/2 corruptions (i.e., honest majority), if and only if it is (n − 2t)-dominated; a functionality is k-dominated, if any k-size subset of its input variables can be set to determine its output. • Assuming the existence of one-way functions, a symmetric n-party functionality can be securely computed facing t ≥ n/2 corruptions (i.e., no honest majority), if and ...
Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
Added 10 Apr 2016
Updated 10 Apr 2016
Type Journal
Year 2016
Where TCC
Authors Ran Cohen, Iftach Haitner, Eran Omri, Lior Rotem
Comments (0)
books