Black-box transformations from passive to covert security with public verifiability

Publikation: Bidrag til bog/antologi/rapport/proceedingKonferencebidrag i proceedingsForskningpeer review

In the context of secure computation, protocols with security against covert adversaries ensure that any misbehavior by malicious parties will be detected by the honest parties with some constant probability. As such, these protocols provide better security guarantees than passively secure protocols and, moreover, are easier to construct than protocols with full security against active adversaries. Protocols that, upon detecting a cheating attempt, allow the honest parties to compute a certificate that enables third parties to verify whether an accused party misbehaved or not are called publicly verifiable. In this work, we present the first generic compilers for constructing two-party protocols with covert security and public verifiability from protocols with passive security. We present two separate compilers, which are both fully blackbox in the underlying protocols they use. Both of them only incur a constant multiplicative factor in terms of bandwidth overhead and a constant additive factor in terms of round complexity on top of the passively secure protocols they use. The first compiler applies to all two-party protocols that have no private inputs. This class of protocols covers the important class of preprocessing protocols that are used to setup correlated randomness among parties. We use our compiler to obtain the first secret-sharing based two-party protocol with covert security and public verifiability. Notably, the produced protocol achieves public verifiability essentially for free when compared with the best known previous solutions based on secret-sharing that did not provide public verifiability. Our second compiler constructs protocols with covert security and public verifiability for arbitrary functionalities from passively secure protocols. It uses our first compiler to perform a setup phase, which is independent of the parties’ inputs as well as the protocol they would like to execute. Finally, we show how to extend our techniques to obtain multiparty computation protocols with covert security and public verifiability against arbitrary constant fractions of corruptions.

OriginalsprogEngelsk
TitelAdvances in Cryptology - CRYPTO 2020
RedaktørerDaniele Micciancio, Thomas Ristenpart
Antal sider30
Vol/bindCham
ForlagSpringer
Udgivelsesår2020
Sider647-676
ISBN (trykt)9783030568795
ISBN (Elektronisk)978-3-030-56880-1
DOI
StatusUdgivet - 2020
Begivenhed40th Annual International Cryptology Conference, CRYPTO 2020 - Santa Barbara, USA
Varighed: 17 aug. 202021 aug. 2020

Konference

Konference40th Annual International Cryptology Conference, CRYPTO 2020
LandUSA
BySanta Barbara
Periode17/08/202021/08/2020
SerietitelLecture Notes in Computer Science
Vol/bind12171
ISSN0302-9743

Se relationer på Aarhus Universitet Citationsformater

ID: 195872231