Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries

We initiate the study of perfectly secure multiparty computation over asynchronous networks tolerating generalized adversaries. The classical results in information-theoretically secure asynchronous multiparty computation among n players state that less than n/4 active adversaries can be tolerated in the perfect setting [4]. Strictly generalizing these results to the non-threshold setting, we show that perfectly secure asynchronous multiparty computation among n players tolerating the adversary structure A is possible if and only if the union of no four sets in the adversary structure cover the full set of players. The computation and communication complexities of the presented protocols are polynomial in the size of the maximal basis of the adversary structure. Our results generalize the results of [16,10] to the asynchronous setting. Furthermore, when restricted to the threshold setting, the protocols of this paper result in solutions as good as the best known asynchronous threshold protocols for the perfect setting. Incidentally, the problems of designing efficient asynchronous secure protocols and adapting the efficiency improvement techniques of the threshold setting to the nonthreshold setting were mentioned as open in [18,17].

[1]  Ran Canetti,et al.  Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.

[2]  Matthew K. Franklin,et al.  Communication complexity of secure computation (extended abstract) , 1992, STOC '92.

[3]  Tal Rabin,et al.  Asynchronous secure computations with optimal resilience (extended abstract) , 1994, PODC '94.

[4]  Avi Wigderson,et al.  On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.

[5]  Yuval Ishai,et al.  Efficient Multi-party Computation over Rings , 2003, EUROCRYPT.

[6]  Ueli Maurer,et al.  Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.

[7]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[8]  Ran Canetti,et al.  Asynchronous secure computation , 1993, STOC.

[9]  Silvio Micali,et al.  Secure Computation (Abstract) , 1991, CRYPTO.

[10]  Ran Canetti,et al.  Fast asynchronous Byzantine agreement with optimal resilience , 1993, STOC.

[11]  Donald Beaver,et al.  Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.

[12]  Ueli Maurer,et al.  Efficient Secure Multi-party Computation , 2000, ASIACRYPT.

[13]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.

[14]  Silvio Micali,et al.  The round complexity of secure protocols , 1990, STOC '90.

[15]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[16]  Tal Rabin,et al.  Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.

[17]  Ueli Maurer,et al.  General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.

[18]  Ivan Damgård,et al.  Efficient Multiparty Computations Secure Against an Adaptive Adversary , 1999, EUROCRYPT.

[19]  Ueli Maurer,et al.  Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.

[20]  Joan Feigenbaum,et al.  Security with Low Communication Overhead , 1990, CRYPTO.

[21]  Ueli Maurer,et al.  Robustness for Free in Unconditional Multi-party Computation , 2001, CRYPTO.

[22]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.