Complete Fairness in Secure Two-Party Computation
Author(s) -
Steven Gordon,
Carmit Hazay,
Jonathan Katz,
Yehuda Lindell
Publication year - 2011
Publication title -
journal of the acm
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.672
H-Index - 134
eISSN - 1557-735X
pISSN - 0004-5411
DOI - 10.1145/2049697.2049698
Subject(s) - correctness , computer science , oblivious transfer , secure multi party computation , discrete logarithm , computation , secure two party computation , cryptography , function (biology) , one way function , logarithm , commitment scheme , class (philosophy) , protocol (science) , cryptographic protocol , property (philosophy) , theoretical computer science , discrete mathematics , computer security , mathematics , algorithm , public key cryptography , encryption , medicine , mathematical analysis , philosophy , alternative medicine , epistemology , pathology , evolutionary biology , artificial intelligence , biology
In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable property is fairness which guarantees, informally, that if one party receives its output, then the other party does too. Cleve [1986] showed that complete fairness cannot be achieved in general without an honest majority. Since then, the accepted folklore has been that nothing non-trivial can be computed with complete fairness in the two-party setting. We demonstrate that this folklore belief is false by showing completely fair protocols for various nontrivial functions in the two-party setting based on standard cryptographic assumptions. We first show feasibility of obtaining complete fairness when computing any function over polynomial-size domains that does not contain an “embedded XOR”; this class of functions includes boolean AND/OR as well as Yao’s “millionaires’ problem”. We also demonstrate feasibility for certain functions that do contain an embedded XOR, though we prove a lower bound showing that any completely fair protocol for such functions must have round complexity super-logarithmic in the security parameter. Our results demonstrate that the question of completely fair secure computation without an honest majority is far from closed.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom