Paper 2007/060

Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries

Yonatan Aumann and Yehuda Lindell


In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should be carried out in a secure way, meaning that no coalition of corrupted parties should be able to learn more than specified or somehow cause the result to be ``incorrect''. Typically, corrupted parties are either assumed to be semi-honest (meaning that they follow the protocol specification) or malicious (meaning that they may deviate arbitrarily from the protocol). However, in many settings, the assumption regarding semi-honest behavior does not suffice and security in the presence of malicious adversaries is excessive and expensive to achieve. In this paper, we introduce the notion of {\em covert adversaries}, which we believe faithfully models the adversarial behavior in many commercial, political, and social settings. Covert adversaries have the property that they may deviate arbitrarily from the protocol specification in an attempt to cheat, but do not wish to be ``caught'' doing so. We provide a definition of security for covert adversaries and show that it is possible to obtain highly efficient protocols that are secure against such adversaries. We stress that in our definition, we quantify over all (possibly malicious) adversaries and do not assume that the adversary behaves in any particular way. Rather, we guarantee that if an adversary deviates from the protocol in a way that would enable it to ``cheat'' (meaning that it can achieve something that is impossible in an ideal model where a trusted party is used to compute the function), then the honest parties are guaranteed to detect this cheating with good probability. We argue that this level of security is sufficient in many settings.

Available format(s)
Cryptographic protocols
Publication info
Published elsewhere. An extended abstract appeared in TCC 2007.
secure computationadversary modelsefficient computation
Contact author(s)
lindell @ cs biu ac il
2009-03-08: last of 3 revisions
2007-02-20: received
See all versions
Short URL
Creative Commons Attribution


      author = {Yonatan Aumann and Yehuda Lindell},
      title = {Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries},
      howpublished = {Cryptology ePrint Archive, Paper 2007/060},
      year = {2007},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.