首页> 外文会议>Theory of cryptography >Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation
【24h】

Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation

机译:多方计算问题的复杂性:两方对称安全功能评估的案例

获取原文
获取原文并翻译 | 示例

摘要

In symmetric secure function evaluation (SSFE), Alice has an input x, Bob has an input y, and both parties wish to securely compute f(x,y). We show several new results classifying the feasibility of securely implementing these functions in several security settings. Namely, we give new alternate characterizations of the functions that have (statistically) secure protocols against passive and active (standalone), computationally unbounded adversaries. We also show a strict, infinite hierarchy of complexity for SSFE functions with respect to universally composable security against unbounded adversaries. That is, there exists a sequence of functions f_1,f_2,... such that there exists a UC-secure protocol for f_i in the f_j-hybrid world if and only if i ≤ j.rnThe main new technical tool that unifies our unrealizability results is a powerful protocol simulation theorem, which may be of independent interest. Essentially, in any adversarial setting (UC, standalone, or passive), f is securely realizable if and only if a very simple (deterministic) "canonical" protocol for f achieves the desired security. Thus, to show that f is unrealizable, one need simply demonstrate a single attack on a single simple protocol.
机译:在对称安全功能评估(SSFE)中,爱丽丝有一个输入x,鲍勃有一个输入y,双方都希望安全地计算f(x,y)。我们显示了几个新结果,这些结果分类了在几种安全设置中安全实施这些功能的可行性。也就是说,我们对具有(统计上)安全协议的功能(针对被动和主动(独立),计算上不受限制的对手)提供了新的替代性描述。关于针对不受限制的对手的通用组合安全性,我们还展示了SSFE功能的严格,无限的复杂性层次结构。也就是说,存在一系列函数f_1,f_2,...,使得当且仅当i≤j.n时,在f_j混合世界中存在针对f_i的UC安全协议。统一我们不可实现性的主要新技术工具结果是一个功能强大的协议仿真定理,该定理可能具有独立的意义。本质上,在任何对抗条件下(UC,独立或被动),只要且仅当针对f的非常简单(确定性)的“规范”协议达到所需的安全性时,f才能安全实现。因此,为了表明f是不可实现的,一个需求仅需演示对单个简单协议的一次攻击。

著录项

  • 来源
    《Theory of cryptography》|2009年|256-273|共18页
  • 会议地点 San Francisco CA(US);San Francisco CA(US)
  • 作者单位

    Department of Computer Science, University of Illinois, Urbana-Champaign;

    Department of Computer Science, University of Illinois, Urbana-Champaign;

    Department of Computer Science, University of Illinois, Urbana-Champaign;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 一般性问题;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号