Foundations of Secure Interactive Computing

作者: Donald Beaver

DOI: 10.1007/3-540-46766-1_31

关键词: Distributed computingCorrectnessFolk theoremMathematical proofSecure multi-party computationOblivious transferProtocol (object-oriented programming)Resilience (network)MathematicsReliability (computer networking)Theoretical computer science

摘要: The problem of secure multiparty computation is usually described as follows: each n players in a network holds private input xi. Together they would like to compute function F(x1,...,xn) without revealing the inputs, even though no particular player can be trusted. Attempts contrive formal definitions for have treated properties solution separately (correctness, privacy, etc.), giving an ad hoc collection desirable and varied that do not support clear or comparable proofs.We propose clear, concise, unified definition security reliability interactive computations. We develop reduction called relative resilience captures all desired at single blow. Relative allows one classify compare arbitrary protocols terms reliability, same way Turing reductions allow algorithms complexity. Security reduce simple statement: protocol F resilient if it ideal which trusted host available F. notions wide variety computations, including zero-knowledge proof systems, Byzantine Agreement, oblivious transfer, two-party circuit evaluation, among others.Relative provides modular techniques other approaches lack: may sequence ranging from real-world protocol, proving successive with greater clarity less Folk theorems about "transitivity" concatenated are now provable; proofs reveal such folk fail under subtle conditions previously gone unnoticed. conciseness modularity our provide great designing reasoning already lead provably significantly more efficient than those appearing literature.

参考文章(31)
Zvi Galil, Stuart Haber, Moti Yung, Cryptographic Computation: Secure Fault-Tolerant Protocols and the Public-Key Model (Extended Abstract) theory and application of cryptographic techniques. pp. 135- 155 ,(1987) , 10.1007/3-540-48184-2_10
Stuart Alan Haber, Multiparty cryptographic computation: techniques and applications Columbia University. ,(1988)
Joan Feigenbaum, Michael Merritt, Distributed computing and cryptography : proceedings of a DIMACS workshop held at the Nassau Inn in Princeton, New Jersey, October 4-6, 1989 American Mathematical Society , Association for Computing Machinery. ,(1991)
Donald Beaver, Stuart Haber, Cryptographic protocols provably secure against dynamic adversaries theory and application of cryptographic techniques. pp. 307- 323 ,(1992) , 10.1007/3-540-47555-9_26
Zvi Galil, Moti Yung, Stuart Haber, Cryptographic Computation: Secure Faut-Tolerant Protocols and the Public-Key Model international cryptology conference. pp. 135- 155 ,(1987)
Donald Beaver, Multiparty Protocols Tolerating Half Faulty Processors international cryptology conference. pp. 560- 572 ,(1989) , 10.1007/0-387-34805-0_49
T. Rabin, M. Ben-Or, Verifiable secret sharing and multiparty protocols with honest majority Proceedings of the twenty-first annual ACM symposium on Theory of computing - STOC '89. pp. 73- 85 ,(1989) , 10.1145/73007.73014
Donald Rozinak Beaver, Michael Rabin, Security, fault tolerance, and communication complexity in distributed systems arXiv: Cryptography and Security. ,(1990)
Shafi Goldwasser, Silvio Micali, Charles Rackoff, The knowledge complexity of interactive proof systems SIAM Journal on Computing. ,vol. 18, pp. 186- 208 ,(1989) , 10.1137/0218012
S Goldwasser, M Sipser, Private coins versus public coins in interactive proof systems symposium on the theory of computing. pp. 59- 68 ,(1986) , 10.1145/12130.12137