Paper 2021/1262

Reverse Firewalls for Adaptively Secure MPC without Setup

Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, and Pratik Sarkar

Abstract

We study Multi-party computation (MPC) in the setting of subversion, where the adversary tampers with the machines of honest parties. Our goal is to construct actively secure MPC protocols where parties are corrupted adaptively by an adversary (as in the standard adaptive security setting), and in addition, honest parties' machines are compromised. The idea of reverse firewalls (RF) was introduced at EUROCRYPT'15 by Mironov and Stephens-Davidowitz as an approach to protecting protocols against corruption of honest parties' devices. Intuitively, an RF for a party $\mathcal{P}$ is an external entity that sits between $\mathcal{P}$ and the outside world and whose scope is to sanitize $\mathcal{P}$’s incoming and outgoing messages in the face of subversion of their computer. Mironov and Stephens-Davidowitz constructed a protocol for passively-secure two-party computation. At CRYPTO'20, Chakraborty, Dziembowski and Nielsen constructed a protocol for secure computation with firewalls that improved on this result, both by extending it to multi-party computation protocol, and considering active security in the presence of static corruptions. In this paper, we initiate the study of RF for MPC in the adaptive setting. We put forward a definition for adaptively secure MPC in the reverse firewall setting, explore relationships among the security notions, and then construct reverse firewalls for MPC in this stronger setting of adaptive security. We also resolve the open question of Chakraborty, Dziembowski and Nielsen by removing the need for a trusted setup in constructing RF for MPC. Towards this end, we construct reverse firewalls for adaptively secure augmented coin tossing and adaptively secure zero-knowledge protocols and obtain a constant round adaptively secure MPC protocol in the reverse firewall setting without setup. Along the way, we propose a new multi-party adaptively secure coin tossing protocol in the plain model, that is of independent interest.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
A minor revision of an IACR publication in Asiacrypt 2021
Keywords
Subversionreverse firewallsmulti-party computationadaptive securitycoin tossing
Contact author(s)
suvradip1111 @ gmail com
chaya @ iisc ac in
mahakp @ cs au dk
pratik93 @ bu edu
History
2021-09-22: received
Short URL
https://ia.cr/2021/1262
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1262,
      author = {Suvradip Chakraborty and Chaya Ganesh and Mahak Pancholi and Pratik Sarkar},
      title = {Reverse Firewalls for Adaptively Secure MPC without Setup},
      howpublished = {Cryptology ePrint Archive, Paper 2021/1262},
      year = {2021},
      note = {\url{https://eprint.iacr.org/2021/1262}},
      url = {https://eprint.iacr.org/2021/1262}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.