Network Agnostic MPC with Statistical Security

06/02/2023
by   ananya-appan, et al.
0

We initiate the study of the network agnostic MPC protocols with statistical security. Network agnostic protocols give the best possible security guarantees irrespective of the underlying network type. We consider the general-adversary model, where the adversary is characterized by an adversary structure which enumerates all possible candidate subsets of corrupt parties. The 𝒬^(k) condition enforces that the union of no k subsets from the adversary structure covers the party set. Given an unconditionally-secure PKI setup, known statistically-secure synchronous MPC protocols are secure against adversary structures satisfying the 𝒬^(2) condition. Known statistically-secure asynchronous MPC protocols can tolerate 𝒬^(3) adversary structures. Fix a set of n parties 𝒫 = {P_1, ... ,P_n} and adversary structures 𝒵_s and 𝒵_a, satisfying the 𝒬^(2) and 𝒬^(3) conditions respectively, where 𝒵_a ⊂𝒵_s. Then, given an unconditionally-secure PKI, we ask whether it is possible to design a statistically-secure MPC protocol resilient against 𝒵_s and 𝒵_a in a synchronous and an asynchronous network respectively if the parties in 𝒫 are unaware of the network type. We show that it is possible iff 𝒵_s and 𝒵_a satisfy the 𝒬^(2,1) condition, meaning that the union of any two subsets from 𝒵_s and any one subset from 𝒵_a is a proper subset of 𝒫. We design several important network agnostic building blocks with the 𝒬^(2,1) condition, such as Byzantine broadcast, Byzantine agreement, information checking protocol, verifiable secret-sharing and secure multiplication protocol, whose complexity is polynomial in n and |𝒵_s|.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/12/2022

Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries

In this work, we study perfectly-secure multi-party computation (MPC) ag...
research
05/26/2022

Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries

In this paper, we design secure multi-party computation (MPC) protocols ...
research
02/09/2020

Network-Agnostic State Machine Replication

We study the problem of state machine replication (SMR) – the underlying...
research
08/30/2018

On the Composability of Statistically Secure Random Oblivious Transfer

We show that stand-alone statistically secure random oblivious transfer ...
research
05/03/2021

From Fairness to Full Security in Multiparty Computation

In the setting of secure multiparty computation (MPC), a set of mutually...
research
04/12/2021

Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head

MPC-in-the-Head (MitH) is a general framework that allows constructing e...
research
03/08/2021

Multiparty Protocol that Usually Shuffles

Multiparty computation is raising importance because it's primary object...

Please sign up or login with your details

Forgot password? Click here to reset