Cryptology ePrint Archive: Report 2017/952

Secure Two-Party Computation with Fairness -- A Necessary Design Principle

Yehuda Lindell and Tal Rabin

Abstract: Protocols for secure two-party computation enable a pair of mutually distrustful parties to carry out a joint computation of their private inputs without revealing anything but the output. One important security property that has been considered is that of fairness which guarantees that if one party learns the output then so does the other. In the case of two-party computation, fairness is not always possible, and in particular two parties cannot fairly toss a coin (Cleve, 1986). Despite this, it is actually possible to securely compute many two-party functions with fairness (Gordon et al., 2008 and follow-up work). However, all two-party protocols known that achieve fairness have the unique property that the effective input of the corrupted party is determined at an arbitrary point in the protocol. This is in stark contrast to almost all other known protocols that have an explicit fixed round at which the inputs are committed.

In this paper, we ask whether or not the property of not having an input committal round is inherent for achieving fairness for two parties. In order to do so, we revisit the definition of security of Micali and Rogaway (Technical report, 1992), that explicitly requires the existence of such a committal round. We adapt the definition of Canetti in the two-party setting to incorporate the spirit of a committal round, and show that under such a definition, it is impossible to achieve fairness for any non-constant two-party function. This result deepens our understanding as to the type of protocol construction that is needed for achieving fairness. In addition, our result discovers a fundamental difference between the definition of security of Micali and Rogaway and that of Canetti (Journal of Cryptology, 2000) which has become the standard today. Specifically, many functions can be securely computed with fairness under the definition of Canetti but no non-constant function can be securely computed with fairness under the definition of Micali and Rogaway.

Category / Keywords: secure computation, fairness, definitions of security

Original Publication (in the same form): IACR-TCC-2017

Date: received 26 Sep 2017, last revised 27 Sep 2017

Contact author: lindell at biu ac il, talr@us ibm com

Available format(s): PDF | BibTeX Citation

Version: 20170927:224915 (All versions of this report)

Short URL: ia.cr/2017/952

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]