On Achieving the “Best of Both Worlds” in Secure Multiparty Computation
Author(s) -
Yuval Ishai,
Jonathan Katz,
Eyal Kushilevitz,
Yehuda Lindell,
Erez Petrank
Publication year - 2011
Publication title -
siam journal on computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.533
H-Index - 122
eISSN - 1095-7111
pISSN - 0097-5397
DOI - 10.1137/100783224
Subject(s) - computer science , secure multi party computation , protocol (science) , computation , wonder , oblivious transfer , secure two party computation , theoretical computer science , computer security , cryptography , algorithm , medicine , psychology , social psychology , alternative medicine , pathology
Two settings are traditionally considered for secure multiparty computation, depending on whether or not a majority of the parties are assumed to be honest. Existing protocols that assume an honest majority provide “full security” (and, in particular, guarantee output delivery and fairness) when this assumption holds, but are completely insecure if this assumption is violated. On the other hand, known protocols tolerating an arbitrary number of corruptions do not guarantee fairness or output delivery even if only a single party is dishonest. It is natural to wonder whether it is possible to achieve the “best of both worlds”: namely, a single protocol that simultaneously achieves the best possible security in both the above settings. Here, we rule out this possibility (at least for general functionalities) and show some positive results regarding what can be achieved.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom