Paper 2004/016

A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer

Dennis Hofheinz and Joern Mueller-Quade

Abstract

This work develops a composable notion of security in a synchronous communication network to analyze cryptographic primitives and protocols in a reliable network with guaranteed delivery. In such a synchronous model the abort of protocols must be handled explicitly. It is shown that a version of *global bit commitment* which allows to identify parties that did not give proper input cannot be securely realized with the primitives *oblivious transfer* and *broadcast*. This proves that the primitives oblivious transfer and broadcast are not complete in our synchronous model of security. In the synchronous model presented ideal functionalities as well as parties can be equipped with a ``shell'' which can delay communication until the adversary allows delivery or the number of rounds since the shell received the message exceeds a specified threshold. This additionally allows asynchronous specification of ideal functionalities and allows to model a network where messages are not necessarily delivered in the right order. If these latency times are chosen to be infinite the network is no more reliable and becomes completely asynchronous. It is shown that secure protocols in the setting of [Canetti01] or [CLOS02] can be transformed to secure realizations in the new model if latency times are chosen to be infinite.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
multi-party computationsoblivious transfer
Contact author(s)
hofheinz @ ira uka de
History
2004-01-27: received
Short URL
https://ia.cr/2004/016
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2004/016,
      author = {Dennis Hofheinz and Joern Mueller-Quade},
      title = {A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer},
      howpublished = {Cryptology {ePrint} Archive, Paper 2004/016},
      year = {2004},
      url = {https://eprint.iacr.org/2004/016}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.