Constant-Round Linear-Broadcast Secure Computation with Penalties

06/13/2022
by   Takeshi Nakai, et al.
0

It is known that Bitcoin enables achieving fairness in secure computation by imposing monetary penalties on adversarial parties. This functionality is called secure computation with penalties. Bentov and Kumaresan (Crypto 2014) introduced the claim-or-refund functionality that can be implemented via Bitcoin. They achieved secure computation with penalties with O(n) rounds and O(n) broadcasts for any function, where n is the number of parties. After that, Kumaresan and Bentov (CCS 2014) showed a constant-round protocol. Unfortunately, this protocol requires O(n^2) broadcasts. As far as we know, no protocol achieves O(1) rounds and O(n) broadcasts based on Bitcoin. This work accomplishes such efficiency in secure computation with penalties. We first show a protocol in a slightly relaxed setting called secure computation with non-equivalent penalties. This setting is the same as secure computation with penalties except that every honest party receives more than a predetermined amount of compensation, while the previous one requires that every honest party receives the same amount of compensation. Namely, our setting allows the compensations for honest parties to be non-equivalent. Moreover, we present a technique to remove the non-equivalence of our protocol without sacrificing efficiency. We then propose a new ideal functionality called claim-refund-or-give that can be implemented via Bitcoin.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/03/2021

Introducing a Framework to Enable Anonymous Secure Multi-Party Computation in Practice

Secure Multi-Party Computation (SMPC) allows a set of parties to securel...
research
05/03/2021

From Fairness to Full Security in Multiparty Computation

In the setting of secure multiparty computation (MPC), a set of mutually...
research
09/22/2018

On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol

In this paper we discuss the security of a distributed inner product (DI...
research
05/03/2021

Characterization of Secure Multiparty Computation Without Broadcast

A major challenge in the study of cryptography is characterizing the nec...
research
07/26/2022

Secure Internet Exams Despite Coercion

We study coercion-resistance for online exams. We propose two properties...
research
08/01/2019

Bitcoin Security under Temporary Dishonest Majority

We prove Bitcoin is secure under temporary dishonest majority. We assume...
research
05/19/2021

LNGate: Powering IoT with Next Generation Lightning Micro-payments using Threshold Cryptography

Bitcoin has emerged as a revolutionary payment system with its decentral...

Please sign up or login with your details

Forgot password? Click here to reset