Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries

08/12/2022
by   ananya-appan, et al.
0

In this work, we study perfectly-secure multi-party computation (MPC) against general (non-threshold) adversaries. Known protocols in a synchronous network are secure against Q^(3) adversary structures, while in an asynchronous network, known protocols are secure against Q^(4) adversary structures. A natural question is whether there exists a single protocol which remains secure against Q^(3) and Q^(4) adversary structures in a synchronous and in an asynchronous network respectively, where the parties are not aware of the network type. We design the first such best-of-both-worlds protocol against general adversaries. Our result generalizes the result of Appan, Chandramouli and Choudhury (PODC 2022), which presents a best-of-both-worlds perfectly-secure protocol against threshold adversaries. To design our protocol, we present two important building blocks which are of independent interest. The first building block is a best-of-both-worlds perfectly-secure Byzantine agreement (BA) protocol for Q^(3) adversary structures, which remains secure both in a synchronous, as well as an asynchronous network. The second building block is a best-of-both-worlds perfectly-secure verifiable secret-sharing (VSS) protocol, which remains secure against Q^(3) and Q^(4) adversary structures in a synchronous network and an asynchronous network respectively.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/28/2022

Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees

Secure multi-party computation (MPC) is a fundamental problem in secure ...
research
06/02/2023

Network Agnostic MPC with Statistical Security

We initiate the study of the network agnostic MPC protocols with statist...
research
05/16/2018

On the Significance of Quiescent Protocols for Asynchronous Perfectly Secure Message Transmission

We consider the problem of perfect (information-theoretically) secure me...
research
09/16/2020

Perfectly Secure Message Transmission against Rational Adversaries

Secure Message Transmission (SMT) is a two-party cryptographic protocol ...
research
06/05/2019

Security in Asynchronous Interactive Systems

Secure function computation has been thoroughly studied and optimized in...
research
04/04/2020

A Lower Bound for Byzantine Agreement and Consensus for Adaptive Adversaries using VDFs

Large scale cryptocurrencies require the participation of millions of pa...
research
02/16/2019

Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead

In this work we present hbAVSS, the Honey Badger of Asynchronous Verifia...

Please sign up or login with your details

Forgot password? Click here to reset