Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
162 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries (2208.06223v1)

Published 12 Aug 2022 in cs.CR, cs.DC, cs.IT, and math.IT

Abstract: In this work, we study perfectly-secure multi-party computation (MPC) against general (non-threshold) adversaries. Known protocols in a synchronous network are secure against $Q{(3)}$ adversary structures, while in an asynchronous network, known protocols are secure against $Q{(4)}$ adversary structures. A natural question is whether there exists a single protocol which remains secure against $Q{(3)}$ and $Q{(4)}$ adversary structures in a synchronous and in an asynchronous network respectively, where the parties are not aware of the network type. We design the first such best-of-both-worlds protocol against general adversaries. Our result generalizes the result of Appan, Chandramouli and Choudhury (PODC 2022), which presents a best-of-both-worlds perfectly-secure protocol against threshold adversaries. To design our protocol, we present two important building blocks which are of independent interest. The first building block is a best-of-both-worlds perfectly-secure Byzantine agreement (BA) protocol for $Q{(3)}$ adversary structures, which remains secure both in a synchronous, as well as an asynchronous network. The second building block is a best-of-both-worlds perfectly-secure verifiable secret-sharing (VSS) protocol, which remains secure against $Q{(3)}$ and $Q{(4)}$ adversary structures in a synchronous network and an asynchronous network respectively.

Citations (16)

Summary

We haven't generated a summary for this paper yet.