eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2007/394

Almost-everywhere Secure Computation

Juan A. Garay and Rafail Ostrovsky

Abstract

Secure multi-party computation (MPC) is a central problem in cryptography. Unfortunately, it is well known that MPC is possible if and only if the underlying communication network has very large connectivity---specifically, $\Omega(t)$, where $t$ is the number of potential corruptions in the network. This impossibility result renders existing MPC results far less applicable in practice, since most deployed networks have in fact a very small degree. In this paper, we show how to circumvent this impossibility result and achieve meaningful security guarantees for graphs with small degree (such as expander graphs and several other topologies). In fact, the notion we introduce, which we call {\em almost-everywhere MPC}, building on the notion of almost-everywhere agreement due to Dwork, Peleg, Pippenger and Upfal, allows the degree of the network to be much smaller than the total number of allowed corruptions. In essence, our definition allows the adversary to {\em implicitly} wiretap some of the good nodes by corrupting sufficiently many nodes in the ``neighborhood'' of those nodes. We show protocols that satisfy our new definition, retaining both correctness and privacy for most nodes despite small connectivity, no matter how the adversary chooses his corruptions. Instrumental in our constructions is a new model and protocol for the {\em secure message transmission} (SMT) problem, which we call {\em SMT by public discussion}, and which we use for the establishment of pairwise secure channels in limited connectivity networks.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
Secure multi-party computationalmost-everywhere agreementsecure message transmissionexpander graphsbounded-degree networks.
Contact author(s)
garay @ research bell-labs com
History
2007-10-14: received
Short URL
https://ia.cr/2007/394
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/394,
      author = {Juan A.  Garay and Rafail Ostrovsky},
      title = {Almost-everywhere Secure Computation},
      howpublished = {Cryptology ePrint Archive, Paper 2007/394},
      year = {2007},
      note = {\url{https://eprint.iacr.org/2007/394}},
      url = {https://eprint.iacr.org/2007/394}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.