Paper 2020/1092
The Round Complexity of Secure Computation Against Covert Adversaries
Arka Rai Choudhuri, Vipul Goyal, and Abhishek Jain
Abstract
We investigate the exact round complexity of secure multiparty computation (MPC) against *covert* adversaries who may attempt to cheat, but do not wish to be caught doing so. Covert adversaries lie in between semi-honest adversaries who follow protocol specification and malicious adversaries who may deviate arbitrarily. Recently, two round protocols for semi-honest MPC and four round protocols for malicious-secure MPC were constructed, both of which are optimal. While these results can be viewed as constituting two end points of a security spectrum, we investigate the design of protocols that potentially span the spectrum. Our main result is an MPC protocol against covert adversaries with variable round complexity: when the detection probability is set to the lowest setting, our protocol requires two rounds and offers same security as semi-honest MPC. By increasing the detecting probability, we can increase the security guarantees, with round complexity five in the extreme case. The security of our protocol is based on standard cryptographic assumptions. We supplement our positive result with a negative result, ruling out *strict* three round protocols with respect to black-box simulation.
Note: Full version of the paper appearing at SCN 2020.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Major revision. 12th Conference on Security and Cryptography for Networks, SCN 2020
- DOI
- 10.1007/978-3-030-57990-6_30
- Keywords
- covert adversaryround complexity
- Contact author(s)
-
achoud @ cs jhu edu
goyal @ cs cmu edu
abhishek @ cs jhu edu - History
- 2020-09-15: received
- Short URL
- https://ia.cr/2020/1092
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2020/1092, author = {Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain}, title = {The Round Complexity of Secure Computation Against Covert Adversaries}, howpublished = {Cryptology {ePrint} Archive, Paper 2020/1092}, year = {2020}, doi = {10.1007/978-3-030-57990-6_30}, url = {https://eprint.iacr.org/2020/1092} }